Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …
systems. A deployed electronic system with one or more undetected Hardware Trojan …
Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning
Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different
stages of the design and fabrication processes. Different approaches have been developed …
stages of the design and fabrication processes. Different approaches have been developed …
Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance
The semiconductor industry is entering a new age in which device scaling and cost
reduction will no longer follow the decades-long pattern. Packing more transistors on a …
reduction will no longer follow the decades-long pattern. Packing more transistors on a …
Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …
task–especially for security-enabled products. Depending on the concrete threat model …
Detecting hardware Trojans using combined self-testing and imaging
Hardware Trojans are malicious modifications in integrated circuits (ICs) with an intent to
breach security and compromise the reliability of an electronic system. This article proposes …
breach security and compromise the reliability of an electronic system. This article proposes …
Refics: A step towards linking vision with hardware assurance
Hardware assurance is a key process in ensuring the integrity, security and functionality of a
hardware device. Its heavy reliance on images, especially on Scanning Electron Microscopy …
hardware device. Its heavy reliance on images, especially on Scanning Electron Microscopy …
Is backside the new backdoor in modern socs?
Modern integrated circuits (ICs) possess several countermeasures to safeguard sensitive
data and information stored in the device. In recent years, semi-invasive physical attacks …
data and information stored in the device. In recent years, semi-invasive physical attacks …
Refics: Assimilating data-driven paradigms into reverse engineering and hardware assurance on integrated circuits
Comprehensive hardware assurance approaches guaranteeing trust on Integrated Circuits
(ICs) typically require the verification of the IC design layout and functionality through …
(ICs) typically require the verification of the IC design layout and functionality through …
Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
The field of microelectronics has experienced extensive integration into various aspects of
our everyday lives, evident via its utilization across a wide range of devices such as …
our everyday lives, evident via its utilization across a wide range of devices such as …