Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021 - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …

An inside job: Remote power analysis attacks on FPGAs

F Schellenberg, DRE Gnad, A Moradi… - IEEE Design & …, 2021 - ieeexplore.ieee.org
This article presents how programmable resources of an FPGA can be utilized to perform
side-channel attacks and reports practical examples of these attacks.-Rosario Cammarota …

Hal—the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion

M Fyrbiak, S Wallat, P Swierczynski… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad
of smart-X devices to military systems. In many attack scenarios an adversary merely has …

Brain-inspired golden chip free hardware trojan detection

S Faezi, R Yasaei, A Barua… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …

Hardware trojan design on neural networks

J Clements, Y Lao - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
Recent innovations and breakthroughs in deep neural networks have advanced or evolved
many industries as well as human daily life. To facilitate the deployment of these models to …

Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations

E Puschner, T Moos, S Becker, C Kison… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …

Design of hardware trojans and its impact on cps systems: A comprehensive survey

A Dhavlle, R Hassan, M Mittapalli… - … on Circuits and …, 2021 - ieeexplore.ieee.org
The ever-increasing demand for sophisticated cyber-physical systems (CPS), combined with
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …

A look at the dark side of hardware reverse engineering-a case study

S Wallat, M Fyrbiak, M Schlögel… - 2017 IEEE 2nd …, 2017 - ieeexplore.ieee.org
A massive threat to the modern and complex IC production chain is the use of untrusted off-
shore foundries which are able to infringe valuable hardware design IP or to inject hardware …

Security implications of intentional capacitive crosstalk

C Kison, OM Awad, M Fyrbiak… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With advances in shrinking process technology sizes, the parasitic effects of closely routed
adjacent wires, crosstalk, still present problems in practice since they directly influence …