Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …

Hardware Trojan attacks: Threat analysis and countermeasures

S Bhunia, MS Hsiao, M Banga… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

On reverse engineering-based hardware Trojan detection

C Bao, D Forte, A Srivastava - IEEE Transactions on Computer …, 2015 - ieeexplore.ieee.org
Due to design and fabrication outsourcing to foundries, the problem of malicious
modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has …

A survey of hardware Trojan threat and defense

H Li, Q Liu, J Zhang - Integration, 2016 - Elsevier
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …

Scalable test generation for Trojan detection using side channel analysis

Y Huang, S Bhunia, P Mishra - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Hardware Trojan detection has emerged as a critical challenge to ensure security and
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …

MERS: statistical test generation for side-channel analysis based Trojan detection

Y Huang, S Bhunia, P Mishra - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Hardware Trojan detection has emerged as a critical challenge to ensure security and
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …

Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability

S Saha, RS Chakraborty, SS Nuthakki, Anshul… - … and Embedded Systems …, 2015 - Springer
Abstract Test generation for Hardware Trojan Horses (HTH) detection is extremely
challenging, as Trojans are designed to be triggered by very rare logic conditions at internal …

Attrition: Attacking static hardware trojan detection techniques using reinforcement learning

V Gohil, H Guo, S Patnaik, J Rajendran - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …

TPAD: Hardware Trojan prevention and detection for trusted integrated circuits

TF Wu, K Ganesan, YA Hu, HSP Wong… - … on Computer-Aided …, 2015 - ieeexplore.ieee.org
There are increasing concerns about possible malicious modifications of integrated circuits
(ICs) used in critical applications. Such attacks are often referred to as hardware Trojans …