Hardware trojans-prevention, detection, countermeasures (a literature review)

M Beaumont, B Hopkins, T Newby - 2011 - apps.dtic.mil
A Hardware Trojan is a malicious, undesired, intentional modification of an electronic circuit
or design, resulting in the incorrect behaviour of an electronic device when in operation-a …

Surveying the hardware trojan threat landscape for the internet-of-things

V Venugopalan, CD Patterson - Journal of Hardware and Systems …, 2018 - Springer
Abstract The Internet-of-Things (IoT) has emerged as one of the most innovative
multidisciplinary paradigms combining heterogeneous sensors, software architectures …

Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making

AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - IEEE …, 2022 - ieeexplore.ieee.org
Context: Denial-of-Service Attack countermeasure techniques (DoS A-CTs) evaluation is a
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …

Defeating UCI: Building stealthy and malicious hardware

C Sturton, M Hicks, D Wagner… - 2011 IEEE symposium on …, 2011 - ieeexplore.ieee.org
In previous work Hicks et al. proposed a method called Unused Circuit Identification (UCI)
for detecting malicious backdoors hidden in circuits at design time. The UCI algorithm …

Security assurance for system-on-chip designs with untrusted IPs

A Basak, S Bhunia, T Tkacik… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Modern system-on-chip (SoC) designs involve integration of a large number of intellectual
property (IP) blocks, many of which are acquired from untrusted third-party vendors. An IP …

Hardware trojan attacks in embedded memory

T Hoque, X Wang, A Basak, R Karam… - 2018 IEEE 36th VLSI …, 2018 - ieeexplore.ieee.org
Embedded memory, typically implemented with Static Random Access Memory (SRAM)
technology, is an integral part of modern processors and System-on-Chips (SoCs). The …

Efficient discovery of abnormal event sequences in enterprise security systems

B Dong, Z Chen, H Wang, LA Tang, K Zhang… - Proceedings of the …, 2017 - dl.acm.org
Intrusion detection system (IDS) is an important part of enterprise security system
architecture. In particular, anomaly-based IDS has been widely applied to detect single …

Addressing hardware security challenges in internet of things: Recent trends and possible solutions

S Koley, P Ghosal - 2015 IEEE 12th Intl Conf on Ubiquitous …, 2015 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging technology where each and every'thing'is possible to
be connected through a network and also controllable from any remote station. Coming few …

Safer path: Security architecture using fragmented execution and replication for protection against trojaned hardware

M Beaumont, B Hopkins… - 2012 Design, Automation & …, 2012 - ieeexplore.ieee.org
Ensuring electronic components are free from Hardware Trojans is a very difficult task.
Research suggests that even the best pre-and post-deployment detection mechanisms will …

Exploiting state obfuscation to detect hardware trojans in NoC network interfaces

J Frey, Q Yu - … IEEE 58th International Midwest Symposium on …, 2015 - ieeexplore.ieee.org
We propose to exploit state obfuscation to facilitate hardware Trojan (HT) detection in the
network interfaces (NIs) of Network-on-Chips (NoCs). The security of IP cores connected …