Hardware Trojans Detection and Prevention Techniques Review

R Naveenkumar, NM Sivamangai - Wireless Personal Communications, 2024 - Springer
Technological developments in semiconductors have created previously unheard-of
chances for creativity, but they have also increased the danger of hardware Trojans, which …

SCOPE: Synthesis-based constant propagation attack on logic locking

A Alaql, MM Rahman, S Bhunia - IEEE Transactions on Very …, 2021 - ieeexplore.ieee.org
Hardware intellectual property (IP) piracy and misuse have introduced new challenges in
the semiconductor industry as untrusted parties in the IP's life cycle may clone, reverse …

SAIL: Analyzing structural artifacts of logic locking using machine learning

P Chakraborty, J Cruz, A Alaql… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Obfuscation or Logic locking (LL) is a technique for protecting hardware intellectual property
(IP) blocks against diverse threats, including IP theft, reverse engineering, and malicious …

Saro: Scalable attack-resistant logic locking

A Alaql, S Bhunia - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
Intellectual property (IP) protection against piracy and reverse engineering (RE) has
emerged as a critical area of research in the field of hardware security. Logic locking has …

Hardware obfuscation for IP protection of DSP applications

NM Sivamangai, GA Nissi - Journal of Electronic Testing, 2022 - Springer
With an increasing risk of circuit piracy and intellectual property (IP), it is necessary to solve
the problem of hardware security in digital signal processing (DSP) via hardware …

LeGO: A learning-guided obfuscation framework for hardware IP protection

A Alaql, S Chattopadhyay… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
The security of hardware intellectual properties (IPs) has become a significant concern, as
the opportunity for piracy, reverse engineering, and malicious modification is increasing …

A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication

M Hasan, T Hoque, F Ganji, D Woodard, D Forte… - Journal of Hardware and …, 2024 - Springer
Access control is already an integral part of the Internet of Things (IoT) to prevent
unauthorized use of systems. However, in the post-pandemic world, contactless …

Scalable attack-resistant obfuscation of logic circuits

A Alaql, S Bhunia - arXiv preprint arXiv:2010.15329, 2020 - arxiv.org
Hardware IP protection has been one of the most critical areas of research in the past years.
Recently, attacks on hardware IPs (such as reverse engineering or cloning) have evolved as …

A Persistent Hierarchical Bloom Filter-based Framework for Authentication and Tracking of ICs

FS Shishir, MM Rizvee, T Hossain, T Hoque… - arXiv preprint arXiv …, 2024 - arxiv.org
Detecting counterfeit integrated circuits (ICs) in unreliable supply chains demands robust
tracking and authentication. Physical Unclonable Functions (PUFs) offer unique IC …

BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person

S Shomaji, Z Guo, F Ganji, N Karimian… - Journal of Hardware and …, 2021 - Springer
As the internet-of-things (IoT) era begins, there is a significant need for low-cost access
control schemes that allow humans to activate and maintain IoT systems. Traditional …