An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Unlocking hardware security assurance: The potential of llms

X Meng, A Srivastava, A Arunachalam, A Ray… - arXiv preprint arXiv …, 2023 - arxiv.org
System-on-Chips (SoCs) form the crux of modern computing systems. SoCs enable high-
level integration through the utilization of multiple Intellectual Property (IP) cores. However …

Qif-verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment

X Guo, RG Dutta, J He… - … on Hardware Oriented …, 2019 - ieeexplore.ieee.org
Hardware vulnerabilities are often due to design mistakes because the designer does not
sufficiently consider potential security vulnerabilities at the design stage. As a result, various …

Leaking wireless ICs via hardware trojan-infected synchronization

AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at
leaking sensitive information within a legitimate transmission. The HT is hidden inside the …

Run-time hardware Trojan detection in analog and mixed-signal ICs

A Pavlidis, E Faehn, MM Louërat… - 2022 IEEE 40th VLSI …, 2022 - ieeexplore.ieee.org
Hardware Trojan (HT) insertion is a major security threat for electronic components that
demand a high trust level. Several HT attack mechanisms have been demonstrated to date …

Early SoCs Information Flow Policies Validation using SystemC-based Virtual Prototypes at the ESL

M Goli, R Drechsler - ACM Transactions on Embedded Computing …, 2024 - dl.acm.org
Virtual Prototypes (VPs) at the Electronic System Level (ESL) are being increasingly
adopted by the semiconductor industry and play an important role in modernizing the …

Proof-carrying hardware-based information flow tracking in analog/mixed-signal designs

MM Bidmeshki, A Antonopoulos… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Information flow tracking (IFT) is a widely used methodology for ensuring data confidentiality
and/or integrity in electronic systems and many such methods have been developed at …

On-chip data security against untrustworthy software and hardware IPs in embedded systems

SC Gundabolu, X Wang - 2018 IEEE Computer Society Annual …, 2018 - ieeexplore.ieee.org
State-of-the-art system-on-chip (SoC) field programmable gate arrays (FPGAs) integrate
hard powerful ARM processor cores and the reconfigurable logic fabric on a single chip in …

ASAX: Automatic security assertion extraction for detecting Hardware Trojans

C Wang, Y Cai, Q Zhou, H Wang - 2018 23rd Asia and South …, 2018 - ieeexplore.ieee.org
Hardware Trojans (HT) has been one of the major concerns of IC designers, and formal
methods have been applied to the HT detection. In general, the assertions for detecting HT …