Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Hardware obfuscation and logic locking: A tutorial introduction

T Hoque, RS Chakraborty, S Bhunia - IEEE Design & Test, 2020 - ieeexplore.ieee.org
If you are designing or integrating hardware IP blocks into your designs, and you are using
common global supply chains, then reading this overview article on how to protect your IP …

OPTI-Sim: Performing Optical Probing Simulation on Layout Design Files

S Parvin, M Goli, FS Torres… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent studies have revealed that laser-based Side-Channel Analysis (SCA) attack
methods, particularly Optical Probing (OP), pose a serious threat to the security of Integrated …

New security threats on fpgas: From fpga design tools perspective

S Sunkavilli, Z Zhang, Q Yu - 2021 IEEE Computer Society …, 2021 - ieeexplore.ieee.org
The growing market share of FPGAs motivates the increasing number of attackers to tamper
with FPGA systems. The majority of existing research efforts on FPGA security focus on …

A survey on fpga cybersecurity design strategies

A Proulx, JY Chouinard, P Fortier, A Miled - ACM Transactions on …, 2023 - dl.acm.org
This article presents a critical literature review on the security aspects of field-programmable
gate array (FPGA) devices. FPGA devices present unique challenges to cybersecurity …

FPGA Bitstream Modification: Attacks and Countermeasures

M Moraitis - IEEE Access, 2023 - ieeexplore.ieee.org
Advances in Field-Programmable Gate Array (FPGA) technology in recent years have
resulted in an expansion of its usage in a very wide spectrum of applications. Apart from …

A framework for automated exploration of trojan attack space in fpga netlists

J Cruz, C Posada, NVR Masna… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Field Programmable Gate Arrays (FPGAs) provide a flexible compute platform for quick
prototyping or hardware acceleration in diverse application domains. However, similar to the …

A Systematic Literature Review on Vulnerabilities, Mitigation Techniques, and Attacks in Field-Programmable Gate Arrays

A Alsuwaiyan, AA Habib, AB Imoukhuede… - Arabian Journal for …, 2025 - Springer
This paper presents a systematic literature review (SLR) of the vulnerabilities of field-
programmable gate arrays (FPGAs), based on 51 carefully selected articles from a pool of …

Hardware trojan attack in embedded memory

X Wang, T Hoque, A Basak, R Karam, W Hu… - ACM Journal on …, 2021 - dl.acm.org
Static Random Access Memory (SRAM) is a core technology for building computing
hardware, including cache memory, register files and field programmable gate array …

FPGA design deobfuscation by iterative LUT modification at bitstream level

M Moraitis, E Dubrova - Journal of Hardware and Systems Security, 2023 - Springer
Hardware obfuscation is a well-known countermeasure against reverse engineering. For
FPGA designs, obfuscation can be implemented with a small overhead by using …