A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …
inspired academic and industrial communities to explore its potential to address hardware …
Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective
G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …
devices act in concert, rarely requiring human intervention, posing significant challenges in …
Hardware trojans: Lessons learned after one decade of research
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …
from around the globe have become more heavily involved in all phases of the electronics …
A survey on chip to system reverse engineering
The reverse engineering (RE) of electronic chips and systems can be used with honest and
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
The hardware Trojan (HT) has become a major threat for the integrated circuit (IC) industry
and supply chain, and has motivated numerous developments of Trojan detection schemes …
and supply chain, and has motivated numerous developments of Trojan detection schemes …
On reverse engineering-based hardware Trojan detection
Due to design and fabrication outsourcing to foundries, the problem of malicious
modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has …
modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has …
Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
A survey of hardware Trojan threat and defense
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …
various means to steal the internal sensitive data or modify original functionality, which may …
Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
Hardware trojan detection using machine learning: A tutorial
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …
number of Designers and Design houses. As setting up a fabrication facility may easily cost …