An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

VeriTrust: Verification for hardware trust

J Zhang, F Yuan, L Wei, Z Sun, Q Xu - Proceedings of the 50th Annual …, 2013 - dl.acm.org
Hardware Trojans (HTs) implemented by adversaries serve as backdoors to subvert or
augment the normal operation of infected devices, which may lead to functionality changes …

On reverse engineering-based hardware Trojan detection

C Bao, D Forte, A Srivastava - IEEE Transactions on Computer …, 2015 - ieeexplore.ieee.org
Due to design and fabrication outsourcing to foundries, the problem of malicious
modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has …

Detrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware trojans

J Zhang, F Yuan, Q Xu - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
Hardware Trojans (HTs) inserted at design time by malicious insiders on the design team or
third-party intellectual property (IP) providers pose a serious threat to the security of …

On application of one-class SVM to reverse engineering-based hardware Trojan detection

C Bao, D Forte, A Srivastava - … International Symposium on …, 2014 - ieeexplore.ieee.org
Due to design and fabrication outsourcing to foundries, the problem of malicious
modifications to integrated circuits known as hardware Trojans has attracted attention in …

Attrition: Attacking static hardware trojan detection techniques using reinforcement learning

V Gohil, H Guo, S Patnaik, J Rajendran - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …

Temperature tracking: Toward robust run-time detection of hardware Trojans

C Bao, D Forte, A Srivastava - IEEE Transactions on Computer …, 2015 - ieeexplore.ieee.org
The hardware Trojan threat has motivated development of Trojan detection schemes at all
stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on …

Machine learning for hardware trojan detection: A review

KG Liakos, GK Georgakilas… - … on Electronics & …, 2019 - ieeexplore.ieee.org
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

Deterrent: detecting trojans using reinforcement learning

V Gohil, S Patnaik, H Guo, D Kalathil… - Proceedings of the 59th …, 2022 - dl.acm.org
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicious threat. Since HTs
are activated under rare trigger conditions, detecting them using random logic simulations is …