A survey of hardware trojan taxonomy and detection

M Tehranipoor, F Koushanfar - IEEE design & test of computers, 2010 - ieeexplore.ieee.org
A Survey of Hardware Trojan Taxonomy and Detection Page 1 A Survey of Hardware Trojan
Taxonomy and Detection Mohammad Tehranipoor University of Connecticut Farinaz …

Hardware Trojan attacks: Threat analysis and countermeasures

S Bhunia, MS Hsiao, M Banga… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Hardware Trojan: Threats and emerging solutions

RS Chakraborty, S Narasimhan… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Malicious modification of hardware during design or fabrication has emerged as a major
security concern. Such tampering (also referred to as Hardware Trojan) causes an …

Breakthrough silicon scanning discovers backdoor in military chip

S Skorobogatov, C Woods - … and Embedded Systems–CHES 2012: 14th …, 2012 - Springer
This paper is a short summary of the first real world detection of a backdoor in a military
grade FPGA. Using an innovative patented technique we were able to detect and analyse in …

Hardware Trojans: current challenges and approaches

N Jacob, D Merli, J Heyszl, G Sigl - IET Computers & Digital …, 2014 - Wiley Online Library
More and more manufacturers outsource parts of the design and fabrication of integrated
circuits (ICs) for cost reduction. Recent publications show that such outsourcing can pose …

A novel technique for improving hardware trojan detection and reducing trojan activation time

H Salmani, M Tehranipoor… - IEEE transactions on very …, 2011 - ieeexplore.ieee.org
Fabless semiconductor industry and government agencies have raised serious concerns
about tampering with inserting hardware Trojans in an integrated circuit supply chain in …

Hardware Trojan detection by multiple-parameter side-channel analysis

S Narasimhan, D Du, RS Chakraborty… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
Hardware Trojan attack in the form of malicious modification of a design has emerged as a
major security threat. Sidechannel analysis has been investigated as an alternative to …

A survey of hardware Trojan threat and defense

H Li, Q Liu, J Zhang - Integration, 2016 - Elsevier
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Hardware Trojan horses in cryptographic IP cores

S Bhasin, JL Danger, S Guilley, XT Ngo… - 2013 Workshop on …, 2013 - ieeexplore.ieee.org
Detecting hardware trojans is a difficult task in general. In this article we study hardware
trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The …