Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

A survey of hardware Trojan threat and defense

H Li, Q Liu, J Zhang - Integration, 2016 - Elsevier
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …

The security of ARM TrustZone in a FPGA-based SoC

EM Benhani, L Bossuet, A Aubert - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cybersecurity of embedded systems has become a major challenge for the development of
the Internet of Things, of Cloud computing and other trendy applications without devoting a …

A review on HT attacks in PLD and ASIC designs with potential defence solutions

G Sumathi, L Srivani, D Thirugnana Murthy… - IETE Technical …, 2018 - Taylor & Francis
The tremendous advancement in very large scale integration technology encourages chip
designers to rely on commercial electronic design automation tools, offshore fabrication …

TROP: TRust-aware OPportunistic routing in NoC with hardware trojans

S Sankar, R Gupta, J Jose, S Nandi - ACM Transactions on Design …, 2024 - dl.acm.org
Multiple software and hardware intellectual property (IP) components are combined on a
single chip to form Multi-Processor Systems-on-Chips (MPSoCs). Due to the rigid time-to …

Automatic High Functional Coverage Stimuli Generation for Assertion-based Verification

H Rostami, M Hosseini, A Azarpeyvand… - 2024 IEEE 30th …, 2024 - ieeexplore.ieee.org
Assertion-based verification is a promising method that uses predefined rules, known as
assertions, to check the functionality of hardware designs. The manual assertion definition is …

[HTML][HTML] HT-PGFV: Security-Aware Hardware Trojan Security Property Generation and Formal Security Verification Scheme

M Qin, J Li, J Yan, Z Hao, W Hu, B Liu - Electronics, 2024 - mdpi.com
Property-driven hardware verification provides a promising way to uncover design
vulnerabilities. However, developing security properties that check for highly concealed …

Run-time hardware Trojan detection in analog and mixed-signal ICs

A Pavlidis, E Faehn, MM Louërat… - 2022 IEEE 40th VLSI …, 2022 - ieeexplore.ieee.org
Hardware Trojan (HT) insertion is a major security threat for electronic components that
demand a high trust level. Several HT attack mechanisms have been demonstrated to date …

Cist: A threat modelling approach for hardware supply chain security

B Halak - Hardware Supply Chain Security: Threat Modelling …, 2021 - Springer
The relentless drive for more sophisticated and cheaper electronics products has led to
unprecedented level of outsourcing in the hardware supply chain. This has led to the …

Runtime hardware Trojan monitors through modeling burst mode communication using formal verification

F Khalid, SR Hasan, O Hasan, F Awwad - Integration, 2018 - Elsevier
Globalization trends in integrated circuit (IC) design using deep sub-micron (DSM)
technologies are leading to increased vulnerability against malicious intrusions. Various …