An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021 - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …

Safety and security in cyber-physical systems and internet-of-things systems

M Wolf, D Serpanos - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
Safety and security have traditionally been distinct problems in engineering and computer
science. The introduction of computing elements to create cyber-physical systems (CPSs) …

Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis

J He, Y Zhao, X Guo, Y Jin - IEEE Transactions on Very Large …, 2017 - ieeexplore.ieee.org
The hardware Trojan (HT) has become a major threat for the integrated circuit (IC) industry
and supply chain, and has motivated numerous developments of Trojan detection schemes …

Brain-inspired golden chip free hardware trojan detection

S Faezi, R Yasaei, A Barua… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …

Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

Security-aware FSM design flow for identifying and mitigating vulnerabilities to fault attacks

A Nahiyan, F Farahmandi, P Mishra… - … on Computer-aided …, 2018 - ieeexplore.ieee.org
The security of a system-on-chip (SoC) can be compromised by exploiting the vulnerabilities
of the finite state machines (FSMs) in the SoC controller modules through fault injection …

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

C Dong, J Chen, W Guo, J Zou - International Journal of …, 2019 - journals.sagepub.com
With the development of the Internet of Things, smart devices are widely used. Hardware
security is one key issue in the security of the Internet of Things. As the core component of …

Detecting hardware trojans in PCBs using side channel loopbacks

H Pearce, VR Surabhi, P Krishnamurthy… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans.
These may arise when malafide third parties alter PCBs premanufacturing or …

Hardware trojan attacks in embedded memory

T Hoque, X Wang, A Basak, R Karam… - 2018 IEEE 36th VLSI …, 2018 - ieeexplore.ieee.org
Embedded memory, typically implemented with Static Random Access Memory (SRAM)
technology, is an integral part of modern processors and System-on-Chips (SoCs). The …