A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

A survey on chip to system reverse engineering

SE Quadir, J Chen, D Forte, N Asadizanjani… - ACM journal on …, 2016 - dl.acm.org
The reverse engineering (RE) of electronic chips and systems can be used with honest and
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …

An overview of cyber-resilient smart inverters based on practical attack models

BH Ahn, T Kim, S Ahmad, SK Mazumder… - … on Power Electronics, 2023 - ieeexplore.ieee.org
With high penetration of distributed energy resources (DERs), power systems are
increasingly transforming into distributed power grids, which provide grid automation …

The hardware trojan war

S Bhunia, M Tehranipoor - Cham,, Switzerland: Springer, 2018 - Springer
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Electronics supply chain integrity enabled by blockchain

X Xu, F Rahman, B Shakya, A Vassilev… - ACM Transactions on …, 2019 - dl.acm.org
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives,
as well as in critical infrastructures such as power grids, satellite communications, and public …

A survey of cybersecurity of digital manufacturing

P Mahesh, A Tiwari, C Jin, PR Kumar… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance
quality and productivity, which reduces inventory and the lead time for delivering custom …

Review of THz-based semiconductor assurance

J True, C Xi, N Jessurun, K Ahi… - Optical …, 2021 - spiedigitallibrary.org
Terahertz radiation for inspection and fault detection has been of interest for the
semiconductor industry since the first generation and detection of THz signals. Until recent …

On malicious implants in PCBs throughout the supply chain

J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …

Flaw3d: A trojan-based cyber attack on the physical outcomes of additive manufacturing

H Pearce, K Yanamandra, N Gupta… - … /ASME Transactions on …, 2022 - ieeexplore.ieee.org
Additive manufacturing (AM) systems such as 3-D printers use inexpensive microcontrollers
that rarely feature cybersecurity defenses. This is a risk, especially given the rising threat …