Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning

N Vashistha, H Lu, Q Shi, MT Rahman… - … for Testing and …, 2018 - dl.asminternational.org
Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different
stages of the design and fabrication processes. Different approaches have been developed …

Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance

N Vashistha, ML Rahman, MSU Haque… - Cryptology ePrint …, 2022 - eprint.iacr.org
The semiconductor industry is entering a new age in which device scaling and cost
reduction will no longer follow the decades-long pattern. Packing more transistors on a …

Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations

E Puschner, T Moos, S Becker, C Kison… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …

Detecting hardware Trojans using combined self-testing and imaging

N Vashistha, H Lu, Q Shi, DL Woodard… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Hardware Trojans are malicious modifications in integrated circuits (ICs) with an intent to
breach security and compromise the reliability of an electronic system. This article proposes …

Refics: A step towards linking vision with hardware assurance

R Wilson, H Lu, M Zhu, D Forte… - Proceedings of the …, 2022 - openaccess.thecvf.com
Hardware assurance is a key process in ensuring the integrity, security and functionality of a
hardware device. Its heavy reliance on images, especially on Scanning Electron Microscopy …

Is backside the new backdoor in modern socs?

N Vashistha, MT Rahman… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Modern integrated circuits (ICs) possess several countermeasures to safeguard sensitive
data and information stored in the device. In recent years, semi-invasive physical attacks …

Refics: Assimilating data-driven paradigms into reverse engineering and hardware assurance on integrated circuits

R Wilson, H Lu, M Zhu, D Forte, DL Woodard - IEEE Access, 2021 - ieeexplore.ieee.org
Comprehensive hardware assurance approaches guaranteeing trust on Integrated Circuits
(ICs) typically require the verification of the IC design layout and functionality through …

Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges

K Nyako, S Devkota, F Li, V Borra - Electronics, 2023 - mdpi.com
The field of microelectronics has experienced extensive integration into various aspects of
our everyday lives, evident via its utilization across a wide range of devices such as …