A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

Distributed Energy Resource Management System (DERMS) Cybersecurity Scenarios, Trends, and Potential Technologies: A Review

N Sugunaraj, SRA Balaji, BS Chandar… - … Surveys & Tutorials, 2025 - ieeexplore.ieee.org
Critical infrastructures like the power grid are at risk from increasing cyber threats due to
high penetration of interconnected distributed energy resources (DER). Compromised DER …

A survey on hardware vulnerability analysis using machine learning

Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …

Contrastive graph convolutional networks for hardware Trojan detection in third party IP cores

N Muralidhar, A Zubair, N Weidler… - … Security and Trust …, 2021 - ieeexplore.ieee.org
The availability of wide-ranging third-party intellectual property (3PIP) cores enables
integrated circuit (IC) designers to focus on designing high-level features in ASICs/SoCs …

Quantifiable assurance: from IPs to platforms

B Ahmed, MK Bepary, N Pundir, M Borza… - arXiv preprint arXiv …, 2022 - arxiv.org
Hardware vulnerabilities are generally considered more difficult to fix than software ones
because they are persistent after fabrication. Thus, it is crucial to assess the security and fix …

Survey: Hardware trojan detection for netlist

Y Yang, J Ye, Y Cao, J Zhang, X Li… - 2020 IEEE 29th Asian …, 2020 - ieeexplore.ieee.org
The development of integrated circuit technology is accompanied by potential threats.
Malicious modifications to circuits, known as hardware Trojans, are major security concerns …

X-dfs: Explainable artificial intelligence guided design-for-security solution space exploration

T Mahfuz, S Bhunia… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Design and manufacturing of integrated circuits predominantly use a globally distributed
semiconductor supply chain involving diverse entities. The modern semiconductor supply …

Node-wise hardware trojan detection based on graph learning

K Hasegawa, K Yamashita, S Hidano… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In the fourth industrial revolution, securing the protection of supply chains has become an
ever-growing concern. One such cyber threat is a hardware Trojan (HT), a malicious …

[HTML][HTML] Natural language processing for hardware security: Case of hardware trojan detection in FPGAs

J Dofe, W Danesh, V More, A Chaudhari - Cryptography, 2024 - mdpi.com
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime,
making them ideal for applications such as data centers, cloud computing, and edge …

Automatic hardware trojan insertion using machine learning

J Cruz, P Gaikwad, A Nair, P Chakraborty… - arXiv preprint arXiv …, 2022 - arxiv.org
Due to the current horizontal business model that promotes increasing reliance on untrusted
third-party Intellectual Properties (IPs), CAD tools, and design facilities, hardware Trojan …