An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis

J He, Y Zhao, X Guo, Y Jin - IEEE Transactions on Very Large …, 2017 - ieeexplore.ieee.org
The hardware Trojan (HT) has become a major threat for the integrated circuit (IC) industry
and supply chain, and has motivated numerous developments of Trojan detection schemes …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …

Socfuzzer: Soc vulnerability detection using cost function enabled fuzz testing

MM Hossain, A Vafaei, KZ Azar… - … , Automation & Test …, 2023 - ieeexplore.ieee.org
The modern System-on-Chips (SoCs), with numerous complex and heterogeneous
intellectual properties (IPs), and the inclusion of highly-sensitive assets, become the target of …

Sharpen: Soc security verification by hardware penetration test

H Al-Shaikh, A Vafaei, MMM Rahman, KZ Azar… - Proceedings of the 28th …, 2023 - dl.acm.org
As modern SoC architectures incorporate many complex/heterogeneous intellectual
properties (IPs), the protection of security assets has become imperative, and the number of …

A multi-layer hardware trojan protection framework for IoT chips

C Dong, G He, X Liu, Y Yang, W Guo - IEEE Access, 2019 - ieeexplore.ieee.org
Since integrated circuits are performed by several untrusted manufacturers, malicious
circuits (hardware Trojans) can be implanted in any stage of the Internet-of-Things (IoT) …

TaintFuzzer: SoC security verification using taint inference-enabled fuzzing

MM Hossain, NF Dipu, KZ Azar… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Modern System-on-Chip (SoC) designs containing sensitive information have become
targets of malicious attacks. Unfortunately, current verification practices still undermine the …

Hardware trojan detection in third-party digital intellectual property cores by multilevel feature analysis

X Chen, Q Liu, S Yao, J Wang, Q Xu… - … on Computer-Aided …, 2017 - ieeexplore.ieee.org
In modern integrated circuit (IC) designs, intellectual property (IP) cores are often outsourced
and designed by third-party vendors, resulting in the partial relinquishment of the control …

[PDF][PDF] Whisperfuzz: White-box fuzzing for detecting and locating timing vulnerabilities in processors

P Borkar, C Chen, M Rostami, N Singh… - arXiv preprint arXiv …, 2024 - usenix.org
Timing vulnerabilities in processors have emerged as a potent threat. As processors are the
foundation of any computing system, identifying these flaws is imperative. Recently fuzzing …