A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

A survey on split manufacturing: Attacks, defenses, and challenges

TD Perez, S Pagliarini - IEEE Access, 2020 - ieeexplore.ieee.org
In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and
therefore most IC design houses are now working under a fabless business model. In order …

Concerted wire lifting: Enabling secure and cost-effective split manufacturing

S Patnaik, M Ashraf, H Li, J Knechtel… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, we advance the security promise of split manufacturing through judicious
handling of interconnects. First, we study the cost-security tradeoffs underlying for split …

Novel design strategy toward a2 trojan detection based on built-in acceleration structure

D Deng, Y Wang, Y Guo - IEEE Transactions on Computer …, 2020 - ieeexplore.ieee.org
With the separation of design and manufacture in semiconductor industry, self-designed
circuits are exposed to hardware Trojan attacks when they are outsourced to an …

How secure is split manufacturing in preventing hardware trojan?

Y Yang, Z Chen, Y Liu, TY Ho, Y Jin… - ACM Transactions on …, 2020 - dl.acm.org
With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way
to both acquire the high-end nodes in untrusted external foundries and protect the design …

A Secure Design Methodology to Prevent Targeted Trojan Insertion during Fabrication

A Suresh, SN Dhanuskodi… - 2023 IEEE Computer …, 2023 - ieeexplore.ieee.org
Hardware Trojans are malicious modifications made to a circuit for the purpose of altering its
behavior. If Integrated Circuit (IC) fabrication is outsourced to an untrusted foundry, learning …

The Mechanism to Combat Data Leakage Trojans in Circuits using Ranomized Encoding

A Monteiro, AJ Mathew, GV Colaco… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
For any system dealing with data, security is an essential factor. With increasing
manufacturig and production costs, many companies rely on external facilities. There is a …

How to design a trustworthy IPsec VPN device employing nested tunnels?

A Spottka - 2018 - diva-portal.org
Enterprises use site-to-site Virtual Private Network (VPN) technology to securely transmit
data over insecure networks, such as the Internet. By utilizing commercial VPN products …

Information Leakage Attacks and Countermeasures

V Mavroudis - 2022 - discovery.ucl.ac.uk
The scientific community has been consistently working on the pervasive problem of
information leakage, uncovering numerous attack vectors, and proposing various …

[PDF][PDF] Randomness and cryptographic functions

D KLINEC - is.muni.cz
High-quality randomness is an essential component of cryptographic designs. Biases and
deviations from expected distributions can significantly affect or neutralize security …