A cost-driven method for deep-learning-based hardware trojan detection

C Dong, Y Yao, Y Xu, X Liu, Y Wang, H Zhang, L Xu - Sensors, 2023 - mdpi.com
The Cyber-Physical System and even the Metaverse will become the second space in which
human beings live. While bringing convenience to human beings, it also brings many …

On hardware security and trust for chiplet-based 2.5 D and 3D ICs: Challenges and Innovations

S Juan, A Fady, P Anthony, R Philippe - IEEE Access, 2024 - ieeexplore.ieee.org
The relentless pace of transistor miniaturization has enabled developers to continuously
increase chip complexity since the beginning of the information age. However, as transistors …

A security method of hardware Trojan detection using path tracking algorithm

DC Huang, CF Hsiao, TW Chang, YY Chu - EURASIP Journal on Wireless …, 2022 - Springer
Recently, the issue of malicious circuit alteration and attack draws more attention than ever
before due to the globalization of IC design and manufacturing. Malicious circuits, also …

Design for Assurance: Employing Functional Verification Tools for Thwarting Hardware Trojan Threat in 3PIPs

W Hu, B Li, L Wu, Y Li, X Li, L Hong - arXiv preprint arXiv:2311.12321, 2023 - arxiv.org
Third-party intellectual property cores are essential building blocks of modern system-on-
chip and integrated circuit designs. However, these design components usually come from …