XT Ngo, S Bhasin, JL Danger… - … on Hardware Oriented …, 2015 - ieeexplore.ieee.org
Hardware Trojan Horses (HTH) are a serious threat to semiconductor industry with significant economic impact. We introduced in [10] a method called “encoded circuit”, which …
J Francq, F Frick - 2015 Design, Automation & Test in Europe …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HTs) are identified as an emerging threat for the integrity of Integrated Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …
XT Ngo, I Exurville, S Bhasin, JL Danger… - … , Automation & Test …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HT) inserted in integrated circuits have received special attention of researchers. In this paper, we present firstly a novel HT detection technique based on path …
AS Castellanos, AV Marques… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, linear complementary pairs (LCPs) of codes and linear complementary dual (LCD) codes have gained significant attention due to their applications in coding theory and …
B Halak - Hardware Supply Chain Security: Threat Modelling …, 2021 - Springer
The relentless drive for more sophisticated and cheaper electronics products has led to unprecedented level of outsourcing in the hardware supply chain. This has led to the …
A Boripan, S Jitman, P Udomkavanich - Journal of Applied Mathematics …, 2018 - Springer
Abelian codes and complementary dual codes form important classes of linear codes that have been extensively studied due to their rich algebraic structures and wide applications. In …
Disclosed are various embodiments for detecting hardware Trojans through information flow security verification. A file comprising register transfer level (HDL) code for an intel lectual …
This article revisits side-channel analysis from the standpoint of coding theory. On the one hand, the attacker is shown to apply an optimal decoding algorithm in order to recover the …