A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

[HTML][HTML] Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

On malicious implants in PCBs throughout the supply chain

J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …

AdaTest: Reinforcement learning and adaptive sampling for on-chip hardware Trojan detection

H Chen, X Zhang, K Huang, F Koushanfar - ACM Transactions on …, 2023 - dl.acm.org
This paper proposes AdaTest, a novel adaptive test pattern generation framework for
efficient and reliable Hardware Trojan (HT) detection. HT is a backdoor attack that tampers …

A new characterization of hardware trojans

S Moein, TA Gulliver, F Gebali, A Alkandari - IEEE Access, 2016 - ieeexplore.ieee.org
This paper examines hardware trojan threats to semiconductor chips, which is particularly
important for chips intended for vital infrastructure and critical applications. The phases of …

Classification of hardware trojan detection techniques

S Moein, J Subramnian, TA Gulliver… - … & Systems (ICCES), 2015 - ieeexplore.ieee.org
The majority of techniques that have been developed to detect hardware trojans are based
on only specific attributes. Further, the ad hoc approaches that have been employed to …

Non-invasive hardware trojans modeling and insertion: a formal Verification Approach

H Ibrahim, H Azmi, MW El-Kharashi, M Safar - Journal of Electronic Testing, 2024 - Springer
In modern chip designs, shared resources are used extensively. Arbiters usage is crucial to
settle conflicts when multiple requests compete for these shared resources. Making sure …

Hardware Trojan identification using machine learning-based classification

NQM Noor, NNA Sjarif, NHFM Azmi… - Journal of …, 2017 - jtec.utem.edu.my
Abstract As Hardware Trojans (HTs) emerges as the new threats for the integrated circuits
(ICs), methods for identifying and detecting HTs have been widely researched and …

[PDF][PDF] Hardware attack mitigation techniques analysis

S Moein, TA Gulliver, F Gebali… - International Journal on …, 2017 - researchgate.net
The goal of a hardware attack is to physically access a digital system to obtain secret
information or modify the system behavior. These attacks can be classified as covert or overt …

Hardware trojan detection using machine learning technique

NS Chockaiah, SKS Kayal, JK Malar, P Kirithika… - … Conference on Recent …, 2021 - Springer
As the internationalization of Integrated Circuit (IC) production increased, the inclusion of
deliberately stealthy modification called hardware Trojans has also escalated. A hardware …