Locating hardware trojans using combinatorial testing for cryptographic circuits

L Kampel, P Kitsos, DE Simos - IEEE Access, 2022 - ieeexplore.ieee.org
This paper presents a novel method for locating combinational hardware Trojans (HT)
based on fault location approaches used in combinatorial testing. This method relies …

CAD tools pathway in hardware security

SR Rajendran, F Farahmandi… - 2024 37th International …, 2024 - ieeexplore.ieee.org
In modern computer devices, System-on-Chip (SoC) technology is used to design hardware
components. The most sensitive assets of a SoC design are the encryption key …

A node reduction technique for trojan detection and diagnosis in IoT hardware devices

SR Rajendran, N Devi, M Jayakumar - Internet of Things, 2022 - taylorfrancis.com
Secured hardware is necessary to upgrade the performance, reliability and efficiency of any
Internet of Things (IoT) system. Hardware security directly ensures the integrated circuit (IC) …

Introduction to CAD for Hardware Security

F Farahmandi, MS Rahman, SR Rajendran… - CAD for Hardware …, 2023 - Springer
Modern computing devices are designed using System-on-Chip (SoC) technology. The
encryption key, device configurations, and on-device protected data are the high sensitive …

CAD for Hardware Trojan Detection

F Farahmandi, MS Rahman, SR Rajendran… - CAD for Hardware …, 2023 - Springer
With the ever-increasing complexity of designing modern SoCs amplified by the time-to-
market pressures and the growing cost of fabrication, entities worldwide have become …

Online Checkers to Detect Hardware Trojans in AES Hardware Accelerators

SR Rajendran, RS Chakraborty - VLSI and Hardware …, 2021 - api.taylorfrancis.com
ICs embedded in crypto-devices should be trustworthy in nature. However, these ICs may
themselves be compromised. IC manufacturing industries have to spend millions of dollars …