Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may …
EM Benhani, L Bossuet, A Aubert - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cybersecurity of embedded systems has become a major challenge for the development of the Internet of Things, of Cloud computing and other trendy applications without devoting a …
The tremendous advancement in very large scale integration technology encourages chip designers to rely on commercial electronic design automation tools, offshore fabrication …
S Sankar, R Gupta, J Jose, S Nandi - ACM Transactions on Design …, 2024 - dl.acm.org
Multiple software and hardware intellectual property (IP) components are combined on a single chip to form Multi-Processor Systems-on-Chips (MPSoCs). Due to the rigid time-to …
Assertion-based verification is a promising method that uses predefined rules, known as assertions, to check the functionality of hardware designs. The manual assertion definition is …
M Qin, J Li, J Yan, Z Hao, W Hu, B Liu - Electronics, 2024 - mdpi.com
Property-driven hardware verification provides a promising way to uncover design vulnerabilities. However, developing security properties that check for highly concealed …
A Pavlidis, E Faehn, MM Louërat… - 2022 IEEE 40th VLSI …, 2022 - ieeexplore.ieee.org
Hardware Trojan (HT) insertion is a major security threat for electronic components that demand a high trust level. Several HT attack mechanisms have been demonstrated to date …
B Halak - Hardware Supply Chain Security: Threat Modelling …, 2021 - Springer
The relentless drive for more sophisticated and cheaper electronics products has led to unprecedented level of outsourcing in the hardware supply chain. This has led to the …
Globalization trends in integrated circuit (IC) design using deep sub-micron (DSM) technologies are leading to increased vulnerability against malicious intrusions. Various …