Hardware Trojans: current challenges and approaches

N Jacob, D Merli, J Heyszl, G Sigl - IET Computers & Digital …, 2014 - Wiley Online Library
More and more manufacturers outsource parts of the design and fabrication of integrated
circuits (ICs) for cost reduction. Recent publications show that such outsourcing can pose …

Design of hardware trojans and its impact on cps systems: A comprehensive survey

A Dhavlle, R Hassan, M Mittapalli… - … on Circuits and …, 2021 - ieeexplore.ieee.org
The ever-increasing demand for sophisticated cyber-physical systems (CPS), combined with
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …

HARMer: Cyber-attacks automation and evaluation

SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn… - IEEE …, 2020 - ieeexplore.ieee.org
With the increasing growth of cyber-attack incidences, it is important to develop innovative
and effective techniques to assess and defend networked systems against cyber attacks …

Hardware trojan detection using unsupervised deep learning on quantum diamond microscope magnetic field images

M Ashok, MJ Turner, RL Walsworth, EV Levine… - ACM Journal on …, 2022 - dl.acm.org
This article presents a method for hardware trojan detection in integrated circuits.
Unsupervised deep learning is used to classify wide field-of-view (4× 4 mm2), high spatial …

Red team vs. blue team: A real-world hardware Trojan detection case study across four modern CMOS technology generations

E Puschner, T Moos, S Becker, C Kison… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …

Electromagnetic circuit fingerprints for hardware trojan detection

J Balasch, B Gierlichs… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Integrated circuit counterfeits, relabeled parts and maliciously modified integrated circuits
(so-called Hardware Trojan horses) are a recognized emerging threat for embedded …

Sok: A survey of open-source threat emulators

P Zilberman, R Puzis, S Bruskin, S Shwarz… - arxiv preprint arxiv …, 2020 - arxiv.org
Threat emulators are tools or sets of scripts that emulate cyber attacks or malicious behavior.
They can be used to create and launch single procedure attacks and multi-step attacks; the …

A survey on machine learning in hardware security

TÇ Köylü, CR Wedig Reinbrecht… - ACM Journal on …, 2023 - dl.acm.org
Hardware security is currently a very influential domain, where each year countless works
are published concerning attacks against hardware and countermeasures. A significant …

A pragmatic methodology for blind hardware trojan insertion in finalized layouts

A Hepp, T Perez, S Pagliarini, G Sigl - Proceedings of the 41st IEEE …, 2022 - dl.acm.org
A potential vulnerability for integrated circuits (ICs) is the insertion of hardware trojans (HTs)
during manufacturing. Understanding the practicability of such an attack can lead to …

Tapeout of a RISC-V crypto chip with hardware trojans: a case-study on trojan design and pre-silicon detectability

A Hepp, G Sigl - Proceedings of the 18th ACM International Conference …, 2021 - dl.acm.org
This paper presents design and integration of four hardware Trojans (HTs) into a post-
quantum-crypto-enhanced RISC-V micro-controller, which was taped-out in September …