Hardware obfuscation and logic locking: A tutorial introduction

T Hoque, RS Chakraborty, S Bhunia - IEEE Design & Test, 2020 - ieeexplore.ieee.org
If you are designing or integrating hardware IP blocks into your designs, and you are using
common global supply chains, then reading this overview article on how to protect your IP …

Thwarting security threats from malicious FPGA tools with novel FPGA-oriented moving target defense

Z Zhang, L Njilla, CA Kamhoua… - IEEE Transactions on Very …, 2018 - ieeexplore.ieee.org
The increasing usage and popularity of the field-programmable gate array (FPGA) systems
bring in security concerns. Existing countermeasures are mostly based on the assumption …

Diversity-by-design for dependable and secure cyber-physical systems: A survey

Q Zhang, AZ Mohammed, Z Wan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Diversity-based security approaches have been studied for several decades since the
1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …

FPGA Bitstream Modification: Attacks and Countermeasures

M Moraitis - IEEE Access, 2023 - ieeexplore.ieee.org
Advances in Field-Programmable Gate Array (FPGA) technology in recent years have
resulted in an expansion of its usage in a very wide spectrum of applications. Apart from …

Lightweight micro-architecture for IoT & FPGA security

R Chakraborty, UK Mondal, A Debnath… - International Journal of …, 2023 - Springer
Cryptographic standards were created with the goal of being able to work on a wide range of
systems. Small computing systems with limited capacity to implement cryptography have …

Turning the table: Using bitstream reverse engineering to detect FPGA trojans

W Danesh, J Banago, M Rahman - Journal of Hardware and Systems …, 2021 - Springer
According to recent reports and surveys over the last 2 years, field-programmable gate
arrays (FPGAs) have increasingly become the prime targets for carrying out extremely …

Securing FPGA-based obsolete component replacement for legacy systems

Z Zhang, L Njilla, C Kamhoua… - 2018 19th International …, 2018 - ieeexplore.ieee.org
Component-aging is unavoidable in legacy systems. Although re-designing the system
typically results in a high cost, the need to replace aged components for legacy systems is …

Hidden in plaintext: An obfuscation-based countermeasure against FPGA bitstream tampering attacks

T Hoque, K Yang, R Karam, S Tajik, D Forte… - ACM Transactions on …, 2019 - dl.acm.org
Field Programmable Gate Arrays (FPGAs) have become an attractive choice for diverse
applications due to their reconfigurability and unique security features. However, designs …

On the feasibility of using evolvable hardware for hardware Trojan detection and prevention

M Labafniya, S Picek, SE Borujeni, N Mentens - Applied Soft Computing, 2020 - Elsevier
Evolvable hardware (EH) architectures are capable of changing their configuration and
behavior dynamically based on inputs from the environment. In this paper, we investigate …

Proactive defense against security threats on iot hardware

Q Yu, Z Zhang, J Dofe - … and Design of Secure Internet of …, 2020 - Wiley Online Library
The increasing popularity of Internet of Things (IoT) devices brings in new security concerns,
due to their limited resources for protection schemes and the difficulty of managing …