Introduction to hardware security

Y Jin - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …

Hardware Trojan: Threats and emerging solutions

RS Chakraborty, S Narasimhan… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Malicious modification of hardware during design or fabrication has emerged as a major
security concern. Such tampering (also referred to as Hardware Trojan) causes an …

Hardware trojans-prevention, detection, countermeasures (a literature review)

M Beaumont, B Hopkins, T Newby - 2011 - apps.dtic.mil
A Hardware Trojan is a malicious, undesired, intentional modification of an electronic circuit
or design, resulting in the incorrect behaviour of an electronic device when in operation-a …

Hardware Trojan detection by multiple-parameter side-channel analysis

S Narasimhan, D Du, RS Chakraborty… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
Hardware Trojan attack in the form of malicious modification of a design has emerged as a
major security threat. Sidechannel analysis has been investigated as an alternative to …

Brain-inspired golden chip free hardware trojan detection

S Faezi, R Yasaei, A Barua… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …

Golden-free hardware Trojan detection with high sensitivity under process noise

T Hoque, S Narasimhan, X Wang, S Mal-Sarkar… - Journal of Electronic …, 2017 - Springer
Malicious modification of integrated circuits in untrusted design house or foundry has
emerged as a major security threat. Such modifications, popularly referred to as Hardware …

A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis

RS Chakraborty, S Pagliarini, J Mathew… - … on Emerging Topics …, 2017 - ieeexplore.ieee.org
Hardware Trojan Horses have emerged as great threats to modern electronic design and
manufacturing practices. Because of their inherent surreptitious nature, test vector …

OS support for detecting Trojan circuit attacks

G Bloom, B Narahari, R Simha - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Rapid advances in integrated circuit (IC) development predicted by Moore's Law lead to
increasingly complex, hard to verify IC designs. Design insiders or adversaries employed at …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Hardware Trojan detection based on logical testing

A Bazzazi, MT Manzuri Shalmani… - Journal of Electronic …, 2017 - Springer
In recent years, hardware Trojans (HTs) have become one of the main challenging concerns
within the chain of manufacturing digital integrated circuit chips. Because of their diversity in …