Application of machine learning in hardware trojan detection

S Kundu, X Meng, K Basu - 2021 22nd International …, 2021 - ieeexplore.ieee.org
Hardware Trojans (HTs), maliciously inserted in an integrated circuit during untrusted design
or fabrication process pose critical threat to the system security. With the ever increasing …

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies

C Rooney, A Seeam, X Bellekens - Electronics, 2018 - mdpi.com
As a result of the globalisation of the semiconductor design and fabrication processes,
integrated circuits are becoming increasingly vulnerable to malicious attacks. The most …

Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan

J Cheng, Q Feng, C Li, W Yang - Wireless Networks, 2024 - Springer
In this paper, we propose a new run-time monitoring technique to detect hardware Trojan
(HT) on working field-programmable gate array (FPGA), which is helpful for reinforcing the …

On-chip trust evaluation utilizing tdc-based parameter-adjustable security primitive

H Ma, J He, Y Liu, J Kuai, H Li, L Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Field-programmable gate arrays (FPGAs) are integrated circuits (ICs) that can be
reconfigured to the desired functionalities, without manufacturing dedicated chips. Due to …

An efficient multi-parameter approach for FPGA hardware Trojan detection

AP Fournaris, L Pyrgas, P Kitsos - Microprocessors and Microsystems, 2019 - Elsevier
Hardware Trojan (HT) detection in the wild is a challenging endeavor since the inspector
cannot have access to “golden chips” or special and trusted test measurements in order to …

Assuring Netlist-to-Bitstream Equivalence using Physical Netlist Generation and Structural Comparison

R McKendrick, K Faulkner… - … Conference on Field …, 2023 - ieeexplore.ieee.org
Hardware netlists are generally converted into a bitstream and loaded onto an FPGA board
through vendor-provided tools. Due to the proprietary nature of these tools, it is up to the …

Runtime identification of hardware Trojans by feature analysis on gate-level unstructured data and anomaly detection

A Vijayan, MB Tahoori, K Chakrabarty - ACM Transactions on Design …, 2020 - dl.acm.org
As the globalization of chip design and manufacturing process becomes popular, malicious
hardware inclusions such as hardware Trojans pose a serious threat to the security of digital …

An fpga hardware trojan detection approach based on multiple parameter analysis

AP Fournaris, L Pyrgas, P Kitsos - 2018 21st Euromicro …, 2018 - ieeexplore.ieee.org
In this paper an FPGA Hardware Trojan (HT) detection approach based on multiple
parameter analysis is proposed. In this direction, we apply a logic testing method, a run-time …

Approaches for FPGA design assurance

E Cahill, B Hutchings, J Goeders - ACM Transactions on Reconfigurable …, 2021 - dl.acm.org
Field-Programmable Gate Arrays (FPGAs) are widely used for custom hardware
implementations, including in many security-sensitive industries, such as defense …

A hybrid FPGA trojan detection technique based-on combinatorial testing and on-chip sensing

L Pyrgas, P Kitsos - International Symposium on Applied Reconfigurable …, 2018 - Springer
A hybrid Hardware Trojan detection technique is proposed in this paper that combines
Combinatorial Testing in order to consistently trigger the Hardware Trojan, if one is present …