An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Hardware trojans: Lessons learned after one decade of research

K Xiao, D Forte, Y Jin, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning

N Vashistha, H Lu, Q Shi, MT Rahman… - … for Testing and …, 2018 - dl.asminternational.org
Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different
stages of the design and fabrication processes. Different approaches have been developed …

TPAD: Hardware Trojan prevention and detection for trusted integrated circuits

TF Wu, K Ganesan, YA Hu, HSP Wong… - … on Computer-Aided …, 2015 - ieeexplore.ieee.org
There are increasing concerns about possible malicious modifications of integrated circuits
(ICs) used in critical applications. Such attacks are often referred to as hardware Trojans …

Golden-free hardware Trojan detection with high sensitivity under process noise

T Hoque, S Narasimhan, X Wang, S Mal-Sarkar… - Journal of Electronic …, 2017 - Springer
Malicious modification of integrated circuits in untrusted design house or foundry has
emerged as a major security threat. Such modifications, popularly referred to as Hardware …

Htnet: Transfer learning for golden chip-free hardware trojan detection

S Faezi, R Yasaei… - 2021 Design, Automation & …, 2021 - ieeexplore.ieee.org
Design and fabrication outsourcing has made integrated circuits (IC) vulnerable to malicious
modifications by third parties known as hardware Trojans (HT). Over the last decade, the use …

Detecting hardware trojans inserted by untrusted foundry using physical inspection and advanced image processing

N Vashistha, MT Rahman, H Shen, DL Woodard… - Journal of Hardware and …, 2018 - Springer
Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different
stages of the design and fabrication process. Different approaches have been developed to …

Detecting hardware Trojans using combined self-testing and imaging

N Vashistha, H Lu, Q Shi, DL Woodard… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Hardware Trojans are malicious modifications in integrated circuits (ICs) with an intent to
breach security and compromise the reliability of an electronic system. This article proposes …

Golden gates: A new hybrid approach for rapid hardware trojan detection using testing and imaging

Q Shi, N Vashistha, H Lu, H Shen… - … oriented security and …, 2019 - ieeexplore.ieee.org
Hardware Trojans are malicious modifications on integrated circuits (IC), which pose a grave
threat to the security of modern military and commercial systems. Existing methods of …