Application of machine learning in hardware trojan detection
Hardware Trojans (HTs), maliciously inserted in an integrated circuit during untrusted design
or fabrication process pose critical threat to the system security. With the ever increasing …
or fabrication process pose critical threat to the system security. With the ever increasing …
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies
C Rooney, A Seeam, X Bellekens - Electronics, 2018 - mdpi.com
As a result of the globalisation of the semiconductor design and fabrication processes,
integrated circuits are becoming increasingly vulnerable to malicious attacks. The most …
integrated circuits are becoming increasingly vulnerable to malicious attacks. The most …
Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan
J Cheng, Q Feng, C Li, W Yang - Wireless Networks, 2024 - Springer
In this paper, we propose a new run-time monitoring technique to detect hardware Trojan
(HT) on working field-programmable gate array (FPGA), which is helpful for reinforcing the …
(HT) on working field-programmable gate array (FPGA), which is helpful for reinforcing the …
On-chip trust evaluation utilizing tdc-based parameter-adjustable security primitive
Field-programmable gate arrays (FPGAs) are integrated circuits (ICs) that can be
reconfigured to the desired functionalities, without manufacturing dedicated chips. Due to …
reconfigured to the desired functionalities, without manufacturing dedicated chips. Due to …
An efficient multi-parameter approach for FPGA hardware Trojan detection
AP Fournaris, L Pyrgas, P Kitsos - Microprocessors and Microsystems, 2019 - Elsevier
Hardware Trojan (HT) detection in the wild is a challenging endeavor since the inspector
cannot have access to “golden chips” or special and trusted test measurements in order to …
cannot have access to “golden chips” or special and trusted test measurements in order to …
Assuring Netlist-to-Bitstream Equivalence using Physical Netlist Generation and Structural Comparison
R McKendrick, K Faulkner… - … Conference on Field …, 2023 - ieeexplore.ieee.org
Hardware netlists are generally converted into a bitstream and loaded onto an FPGA board
through vendor-provided tools. Due to the proprietary nature of these tools, it is up to the …
through vendor-provided tools. Due to the proprietary nature of these tools, it is up to the …
Runtime identification of hardware Trojans by feature analysis on gate-level unstructured data and anomaly detection
As the globalization of chip design and manufacturing process becomes popular, malicious
hardware inclusions such as hardware Trojans pose a serious threat to the security of digital …
hardware inclusions such as hardware Trojans pose a serious threat to the security of digital …
An fpga hardware trojan detection approach based on multiple parameter analysis
AP Fournaris, L Pyrgas, P Kitsos - 2018 21st Euromicro …, 2018 - ieeexplore.ieee.org
In this paper an FPGA Hardware Trojan (HT) detection approach based on multiple
parameter analysis is proposed. In this direction, we apply a logic testing method, a run-time …
parameter analysis is proposed. In this direction, we apply a logic testing method, a run-time …
Approaches for FPGA design assurance
E Cahill, B Hutchings, J Goeders - ACM Transactions on Reconfigurable …, 2021 - dl.acm.org
Field-Programmable Gate Arrays (FPGAs) are widely used for custom hardware
implementations, including in many security-sensitive industries, such as defense …
implementations, including in many security-sensitive industries, such as defense …
A hybrid FPGA trojan detection technique based-on combinatorial testing and on-chip sensing
L Pyrgas, P Kitsos - International Symposium on Applied Reconfigurable …, 2018 - Springer
A hybrid Hardware Trojan detection technique is proposed in this paper that combines
Combinatorial Testing in order to consistently trigger the Hardware Trojan, if one is present …
Combinatorial Testing in order to consistently trigger the Hardware Trojan, if one is present …