Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Hardware trojans: Lessons learned after one decade of research

K Xiao, D Forte, Y Jin, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap

A Japa, MK Majumder, SK Sahoo… - IEEE Circuits and …, 2021 - ieeexplore.ieee.org
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …

The cat and mouse in split manufacturing

Y Wang, P Chen, J Hu, J Rajendran - Proceedings of the 53rd Annual …, 2016 - dl.acm.org
Split manufacturing of integrated circuits eliminates vulnerabilities introduced by an
untrusted foundry by manufacturing only a part of design at an untrusted high-end foundry …

Efficient and secure split manufacturing via obfuscated built-in self-authentication

K Xiao, D Forte, MM Tehranipoor - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
The threats of reverse-engineering, IP piracy, and hardware Trojan insertion in the
semiconductor supply chain are greater today than ever before. Split manufacturing has …

A survey on split manufacturing: Attacks, defenses, and challenges

TD Perez, S Pagliarini - IEEE Access, 2020 - ieeexplore.ieee.org
In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and
therefore most IC design houses are now working under a fabless business model. In order …

On the impossibility of approximation-resilient circuit locking

K Shamsi, DZ Pan, Y Jin - 2019 IEEE International Symposium …, 2019 - ieeexplore.ieee.org
Logic locking, and Integrated Circuit (IC) Camouflaging, are techniques that try to hide the
design of an IC from a malicious foundry or end-user by introducing ambiguity into the netlist …

Are proximity attacks a threat to the security of split manufacturing of integrated circuits?

J Magaña, D Shi, J Melchert… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Split manufacturing is a technique that allows manufacturing the transistor-level and lower
metal layers of an integrated circuit (IC) at a high-end, untrusted foundry, while …

Hardware trojan detection on a PCB through differential power monitoring

G Piliposyan, S Khursheed… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
There is a general consensus that contemporary electronics are at risk of cyber-attacks or
malicious modifications, such as Hardware Trojans (HT). This makes it crucial to develop …