Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …

A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data

A Nasr, K Mohamed, A Elshenawy, M Zaki - Scientific Reports, 2024 - nature.com
Abstract Hardware Trojans (HTs) are hidden threats embedded in the circuitry of integrated
circuits (ICs), enabling unauthorized access, data theft, operational disruptions, or even …

sThing: A Novel Configurable Ring Oscillator based PUF for Hardware-Assisted Security and Recycled IC Detection

SK Ram, SR Sahoo, BB Das, K Mahapatra… - IEEE …, 2024 - ieeexplore.ieee.org
Ring Oscillator (RO) is widely used to address different hardware security issues. For
example, the RO-based physical unclonable function (PUF) generates a secure and reliable …

[PDF][PDF] IP 软核硬件木马图谱特征分析检测方法

倪林, 李霖, 张帅, 童思程, 钱杨 - 电子与信息学报, 2024 - jeit.ac.cn
随着集成电路技术的飞速发展, 芯片在设计, 生产和封装过程中, 很容易被恶意植入硬件木马逻辑
, 当前IP 软核的安全检测方法逻辑复杂, 容易错漏且无法对加密IP 软核进行检测 …

Graph Features Analysis and Detection Method of IP Soft Core Hardware Trojan

L NI, L LI, S ZHANG, S TONG, Y QIAN - 电子与信息学报, 2024 - jeit.ac.cn
With the rapid development of integrated circuit technology, chips are easily implanted with
malicious hardware Trojan logic in the process of design, production and packaging …