An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

TAAL: Tampering attack on any key-based logic locked circuits

A Jain, Z Zhou, U Guin - ACM Transactions on Design Automation of …, 2021 - dl.acm.org
Due to the globalization of semiconductor manufacturing and test processes, the system-on-
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …

Security closure of IC layouts against hardware Trojans

F Wang, Q Wang, B Fu, S Jiang, X Zhang… - Proceedings of the …, 2023 - dl.acm.org
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced
nowadays. However, passing ICs through various third-party providers gives rise to many …

Run-time hardware trojan detection in analog and mixed-signal ICs

A Pavlidis, E Faehn, MM Louërat… - 2022 IEEE 40th VLSI …, 2022 - ieeexplore.ieee.org
Hardware Trojan (HT) insertion is a major security threat for electronic components that
demand a high trust level. Several HT attack mechanisms have been demonstrated to date …

Leaking wireless ICs via hardware Trojan-infected synchronization

AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at
leaking sensitive information within a legitimate transmission. The HT is hidden inside the …

Quantifying rowhammer vulnerability for dram security

Y Jiang, H Zhu, D Sullivan, X Guo… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
Rowhammer is a memory-based attack that leverages capacitive-coupling to induce faults in
modern dynamic random-access memory (DRAM). Over the last decade, a significant …

Eternal-Thing 2.0: Analog-Trojan-Resilient Ripple-Less Solar Harvesting System for Sustainable IoT

SK Ram, SR Sahoo, BB Das, K Mahapatra… - ACM Journal on …, 2023 - dl.acm.org
Recently, harvesting natural energy is gaining more attention than other conventional
approaches for sustainable IoT. System on chip power requirement for the internet of things …

Novel design strategy toward a2 trojan detection based on built-in acceleration structure

D Deng, Y Wang, Y Guo - IEEE Transactions on Computer …, 2020 - ieeexplore.ieee.org
With the separation of design and manufacture in semiconductor industry, self-designed
circuits are exposed to hardware Trojan attacks when they are outsourced to an …

Large delay analog trojans: A silent fabrication-time attack exploiting analog modalities

T Yang, A Mittal, Y Fei… - IEEE Transactions on Very …, 2020 - ieeexplore.ieee.org
This article presents large delay-based analog Trojan circuits, a new class of analog Trojans
that can be interfaced with digital and analog macros to launch fabrication-time hardware …