Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021 - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …

Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Automated test generation for hardware trojan detection using reinforcement learning

Z Pan, P Mishra - Proceedings of the 26th Asia and South Pacific Design …, 2021 - dl.acm.org
Due to globalized semiconductor supply chain, there is an increasing risk of exposing
System-on-Chip (SoC) designs to malicious implants, popularly known as hardware Trojans …

A survey on hardware vulnerability analysis using machine learning

Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …

Sharpen: Soc security verification by hardware penetration test

H Al-Shaikh, A Vafaei, MMM Rahman, KZ Azar… - Proceedings of the 28th …, 2023 - dl.acm.org
As modern SoC architectures incorporate many complex/heterogeneous intellectual
properties (IPs), the protection of security assets has become imperative, and the number of …

Scalable activation of rare triggers in hardware trojans by repeated maximal clique sampling

Y Lyu, P Mishra - … Transactions on Computer-Aided Design of …, 2020 - ieeexplore.ieee.org
Hardware Trojans are serious threat to security and reliability of computing systems. It is
hard to detect these malicious implants using traditional validation methods since an …

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

C Dong, J Chen, W Guo, J Zou - International Journal of …, 2019 - journals.sagepub.com
With the development of the Internet of Things, smart devices are widely used. Hardware
security is one key issue in the security of the Internet of Things. As the core component of …

AdaTest: Reinforcement learning and adaptive sampling for on-chip hardware Trojan detection

H Chen, X Zhang, K Huang, F Koushanfar - ACM Transactions on …, 2023 - dl.acm.org
This paper proposes AdaTest, a novel adaptive test pattern generation framework for
efficient and reliable Hardware Trojan (HT) detection. HT is a backdoor attack that tampers …

An unsupervised detection approach for hardware trojans

C Dong, Y Liu, J Chen, X Liu, W Guo, Y Chen - IEEE Access, 2020 - ieeexplore.ieee.org
With the booming development of the cyber-physical system, human society is much more
dependent on information technology. Unfortunately, like software, hardware is not trusted at …

Leaking wireless ICs via hardware trojan-infected synchronization

AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at
leaking sensitive information within a legitimate transmission. The HT is hidden inside the …