DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN

L Cassano, M Iamundo, TA Lopez, A Nazzari… - Journal of Systems …, 2022 - Elsevier
Abstract Hardware Trojan Horses (HTHs) represent today a serious issue not only for
academy but also for industry because of the dramatic complexity and dangerousness …

IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks

C Vega, P Slpsk, S Bhunia - IEEE Transactions on Very Large …, 2023 - ieeexplore.ieee.org
Reverse engineering (RE) of hardware designs poses a significant threat to the modern
distributed electronics supply chain. RE can be performed at both chip and printed circuit …

SIGNED: A challenge-response scheme for electronic hardware watermarking

P SLPSK, AA Nair, C Rebeiro… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The emergence of distributed manufacturing ecosystems for electronic hardware involving
untrusted parties has led to diverse trust issues. In particular, Intellectual Property (IP) piracy …

Trusted electronic systems with untrusted cots

S Yang, P Chakraborty, P SLPSK… - 2021 22nd International …, 2021 - ieeexplore.ieee.org
The challenges of custom integrated circuits (IC) design have made it prevalent to integrate
commercial-off-the-shelf (COTS) components (micro-controllers, FPGAs, etc.) in today's …

Hardware trojan attack in embedded memory

X Wang, T Hoque, A Basak, R Karam, W Hu… - ACM Journal on …, 2021 - dl.acm.org
Static Random Access Memory (SRAM) is a core technology for building computing
hardware, including cache memory, register files and field programmable gate array …

Detection methods of hardware trojans based on DBN and QPSO-OCSVM anomalous behavior analysis

L Zhang, T Zhang, C Xiao, J Wang… - 2024 6th International …, 2024 - ieeexplore.ieee.org
At present, hardware trojan detection methods based on the side channel analysis
technology mainly depend on the presence of the template chip, resulting in a problem that it …

Towards Fully Automated Verification of Semiconductor Technologies

M Ludwig, D Purice, B Lippmann… - … for Digitising Industry …, 2022 - taylorfrancis.com
In an ever more connected world, semiconductor devices are at the heart of every
technically sophisticated system. Safety and security in operation, on which many times vital …

Consumer exposure to counterfeit hardware

M Mattioli - IEEE Consumer Electronics Magazine, 2020 - ieeexplore.ieee.org
The proliferation of counterfeit hardware in the ecosystem affects both individuals (ie,
consumers) and organizations (eg, governments, educational institutions, corporations, etc.) …

A Qualitative Study That Explores the Implementation of Artificial Intelligence in Integrated Circuit Design

D Rittman - 2023 - search.proquest.com
The development of data processing technology relies heavily on integrated circuits (ICs),
which are electronic components that perform various tasks, including complex …

[PDF][PDF] Towards trustworthy computing on untrustworthy hardware

H Salem - 2023 - core.ac.uk
Historically, hardware was thought to be inherently secure and trusted due to its obscurity
and the isolated nature of its design and manufacturing. In the last two decades, however …