Exciting FPGA cryptographic Trojans using combinatorial testing

P Kitsos, DE Simos, J Torres-Jimenez… - 2015 IEEE 26th …, 2015 - ieeexplore.ieee.org
Contemporary hardware design shares many similarities with software development. The
injection of malicious functionality (Trojans) in FPGA designs is a realistic threat. Established …

Classification of hardware trojan detection techniques

S Moein, J Subramnian, TA Gulliver… - … & Systems (ICCES), 2015 - ieeexplore.ieee.org
The majority of techniques that have been developed to detect hardware trojans are based
on only specific attributes. Further, the ad hoc approaches that have been employed to …

Efficient triggering of Trojan hardware logic

AG Voyiatzis, KG Stefanidis… - 2016 IEEE 19th …, 2016 - ieeexplore.ieee.org
The detection of malicious hardware logic (hardware Trojan) requires test patterns that
succeed in exciting the malicious logic part. Testing of all possible input patterns is often …

Thermal sensor based hardware Trojan detection in FPGAs

L Pyrgas, F Pirpilidis, A Panayiotarou… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
This paper introduces an efficient technique for the detection of malicious hardware, based
on thermal sensors. Each sensor consists of a Ring Oscillator with three inverters, a control …

Hardware trojan detection using ring oscillator

S Deepthi - 2021 6th International conference on …, 2021 - ieeexplore.ieee.org
Hardware Trojans are malicious modules causing vulnerabilities in designs. Secured
hardware designs are desirable in almost all applications. So, it is important to make a …

[PDF][PDF] 硬件木马: 关键问题研究进展及新动向

黄钊, 王泉, 杨鹏飞 - 计算机学报, 2019 - cjc.ict.ac.cn
摘要全球化商业模式下, 电子计算机行业的设计人员需要利用不同国家或区域的设计/制造服务
以及第三方知识产权(Third PartyIntellectualProperty, 3PIP) 核来完成集成电路 …

TERO-based detection of hardware trojans on FPGA implementation of the AES algorithm

P Kitsos, K Stefanidis… - … Euromicro conference on …, 2016 - ieeexplore.ieee.org
A Transient Effect Ring Oscillator (TERO) is a special case of a Ring Oscillator (RO) design
that exhibits increased sensitivity to intrinsic noise. It can serve as a basis for implementing a …

Ring oscillators and hardware Trojan detection

P Kitsos, N Sklavos, AG Voyiatzis - … and Trust: Design and Deployment of …, 2017 - Springer
Hardware Trojan horses is a realistic threat in the modern IC supply chain. Once the
associate risk is considered, appropriate defense mechanisms must be designed and …

Secure FPGA Design by Filling Unused Spaces.

M Labafniya, R Saeidi - ISeCure, 2019 - search.ebscohost.com
There are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs
are used in many different applications, its security becomes an important concern …

On the effects of ring oscillator length and hardware Trojan size on an FPGA-based implementation of AES

F Pirpilidis, KG Stefanidis, AG Voyiatzis… - Microprocessors and …, 2017 - Elsevier
The recent trend in a wide range of application domains, from the Internet of Things to space
communications, is to deploy computing systems on FPGA devices. Modern FPGA …