Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
Defense-in-depth: A recipe for logic locking to prevail
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …
semiconductor intellectual property (IP) from the untrusted entities in the design and …
Survey of recent developments for hardware trojan detection
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance
The semiconductor industry is entering a new age in which device scaling and cost
reduction will no longer follow the decades-long pattern. Packing more transistors on a …
reduction will no longer follow the decades-long pattern. Packing more transistors on a …
Detecting hardware Trojans using combined self-testing and imaging
Hardware Trojans are malicious modifications in integrated circuits (ICs) with an intent to
breach security and compromise the reliability of an electronic system. This article proposes …
breach security and compromise the reliability of an electronic system. This article proposes …
Risk-aware and explainable framework for ensuring guaranteed coverage in evolving hardware Trojan detection
As the semiconductor industry has shifted to a fabless paradigm, the risk of hardware
Trojans being inserted at various stages of production has also increased. Recently, there …
Trojans being inserted at various stages of production has also increased. Recently, there …
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …
systems. A deployed electronic system with one or more undetected Hardware Trojan …
Robust hardware trojan detection method by unsupervised learning of electromagnetic signals
D Lee, J Lee, Y Jung, J Kauh… - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
This article explores the threat posed by Hardware Trojans (HTs), malicious circuits
clandestinely embedded in hardware akin to software backdoors. Activation by attackers …
clandestinely embedded in hardware akin to software backdoors. Activation by attackers …
Is backside the new backdoor in modern socs?
Modern integrated circuits (ICs) possess several countermeasures to safeguard sensitive
data and information stored in the device. In recent years, semi-invasive physical attacks …
data and information stored in the device. In recent years, semi-invasive physical attacks …
Two sides of the same coin: Boons and banes of machine learning in hardware security
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …
machine learning (ML) and hardware security. The confluence of the two technologies has …