A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Mind the portability: A warriors guide through realistic profiled side-channel analysis

S Bhasin, A Chattopadhyay, A Heuser… - NDSS 2020-Network …, 2020 - inria.hal.science
Profiled side-channel attacks represent a practical threat to digital devices, thereby having
the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart …

Creating a backscattering side channel to enable detection of dormant hardware trojans

LN Nguyen, CL Cheng, M Prvulovic… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
This paper describes a new physical side channel, ie, the backscattering side channel,
created by transmitting a signal toward the integrated circuits (ICs), where the internal …

Introduction to hardware Trojan detection methods

J Francq, F Frick - 2015 Design, Automation & Test in Europe …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HTs) are identified as an emerging threat for the integrity of Integrated
Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …

A novel golden-chip-free clustering technique using backscattering side channel for hardware trojan detection

LN Nguyen, BB Yilmaz, M Prvulovic… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Over the past few years, malicious hardware modifications, aka hardware Trojans (HT), have
emerged as a major security threat because integrated circuit (IC) companies have been …

Detecting hardware trojans in PCBs using side channel loopbacks

H Pearce, VR Surabhi, P Krishnamurthy… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans.
These may arise when malafide third parties alter PCBs premanufacturing or …

An on-chip technique to detect hardware trojans and assist counterfeit identification

M Lecomte, J Fournier… - IEEE Transactions on Very …, 2016 - ieeexplore.ieee.org
This paper introduces an embedded solution for the detection of hardware trojans (HTs) and
counterfeits. The proposed method, which considers that HTs are necessarily inserted on …

[PDF][PDF] EM Side Channels in Hardware Security: Attacks and Defenses.

J He, X Guo, MM Tehranipoor, A Vassilev… - IEEE Des …, 2022 - ieeexplore.ieee.org
Side channel analysis (SCA) imposes a severe security threat to circuit implementations,
especially to cryptographic hardware. Among all side channel parameters, electromagnetic …

Leaking wireless ICs via hardware trojan-infected synchronization

AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at
leaking sensitive information within a legitimate transmission. The HT is hidden inside the …

Supervised and unsupervised machine learning for side-channel based Trojan detection

D Jap, W He, S Bhasin - 2016 IEEE 27th International …, 2016 - ieeexplore.ieee.org
Hardware Trojan (HT) has recently drawn much attention in both industry and academia due
to the global outsourcing trend in semiconductor manufacturing, where a malicious logic can …