An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the integrated circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third-party …

AI/ML algorithms and applications in VLSI design and technology

D Amuru, A Zahra, HV Vudumula, PK Cherupally… - Integration, 2023 - Elsevier
An evident challenge ahead for the integrated circuit (IC) industry is the investigation and
development of methods to reduce the design complexity ensuing from growing process …

Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021 - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …

Attrition: Attacking static hardware trojan detection techniques using reinforcement learning

V Gohil, H Guo, S Patnaik, J Rajendran - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …

Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions

KZ Azar, MM Hossain, A Vafaei, H Al Shaikh… - Cryptology ePrint …, 2022 - eprint.iacr.org
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …

[HTML][HTML] Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

An automated configurable Trojan insertion framework for dynamic trust benchmarks

J Cruz, Y Huang, P Mishra… - 2018 Design, Automation …, 2018 - ieeexplore.ieee.org
Malicious hardware modification, also known as hardware Trojan attack, has emerged as a
serious security concern for electronic systems. Such attacks compromise the basic premise …