Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …

Introduction to hardware security

Y ** - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …

Safety and security in cyber-physical systems and internet-of-things systems

M Wolf, D Serpanos - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
Safety and security have traditionally been distinct problems in engineering and computer
science. The introduction of computing elements to create cyber-physical systems (CPSs) …

Hardware Trojan: Threats and emerging solutions

RS Chakraborty, S Narasimhan… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Malicious modification of hardware during design or fabrication has emerged as a major
security concern. Such tampering (also referred to as Hardware Trojan) causes an …

Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis

J He, Y Zhao, X Guo, Y ** - IEEE Transactions on Very Large …, 2017 - ieeexplore.ieee.org
The hardware Trojan (HT) has become a major threat for the integrated circuit (IC) industry
and supply chain, and has motivated numerous developments of Trojan detection schemes …

Experiences in hardware Trojan design and implementation

Y **, N Kupp, Y Makris - 2009 IEEE international workshop on …, 2009 - ieeexplore.ieee.org
We report our experiences in designing and implementing several hardware Trojans within
the framework of the Embedded System Challenge competition that was held as part of the …

Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps

AN Nowroz, K Hu, F Koushanfar… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Hardware Trojans are malicious alterations or injections of unwanted circuitry to integrated
circuits (ICs) by untrustworthy factories. They render great threat to the security of modern …

Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad s

J Aarestad, D Acharyya, R Rad… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Hardware Trojans have emerged as a new threat to the security and trust of computing
systems. Hardware Trojans are deliberate and malicious modifications to the logic function …

Hardware Trojan horses in cryptographic IP cores

S Bhasin, JL Danger, S Guilley, XT Ngo… - 2013 Workshop on …, 2013 - ieeexplore.ieee.org
Detecting hardware trojans is a difficult task in general. In this article we study hardware
trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The …

Silicon demonstration of hardware Trojan design and detection in wireless cryptographic ICs

Y Liu, Y **, A Nosratinia… - IEEE Transactions on Very …, 2016 - ieeexplore.ieee.org
Using silicon measurements from 40 chips fabricated in Taiwan Semiconductor
Manufacturing Company's (TSMC's) 0.35-μm technology, we demonstrate the operation of …