Hardware trojan detection using machine learning: A tutorial
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …
number of Designers and Design houses. As setting up a fabrication facility may easily cost …
Hardware Trojan attacks: Threat analysis and countermeasures
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
Conventional and machine learning approaches as countermeasures against hardware trojan attacks
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …
increasing at a steady pace. This rapid development drives the technology companies to …
On reverse engineering-based hardware Trojan detection
Due to design and fabrication outsourcing to foundries, the problem of malicious
modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has …
modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has …
A survey of hardware Trojan threat and defense
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …
various means to steal the internal sensitive data or modify original functionality, which may …
Scalable test generation for Trojan detection using side channel analysis
Hardware Trojan detection has emerged as a critical challenge to ensure security and
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …
MERS: statistical test generation for side-channel analysis based Trojan detection
Hardware Trojan detection has emerged as a critical challenge to ensure security and
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …
Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability
Abstract Test generation for Hardware Trojan Horses (HTH) detection is extremely
challenging, as Trojans are designed to be triggered by very rare logic conditions at internal …
challenging, as Trojans are designed to be triggered by very rare logic conditions at internal …
Attrition: Attacking static hardware trojan detection techniques using reinforcement learning
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …
bypass the security of critical infrastructures. Although researchers have proposed many …
TPAD: Hardware Trojan prevention and detection for trusted integrated circuits
There are increasing concerns about possible malicious modifications of integrated circuits
(ICs) used in critical applications. Such attacks are often referred to as hardware Trojans …
(ICs) used in critical applications. Such attacks are often referred to as hardware Trojans …