Today, outsourced manufacturing of integrated circuit designs are prone to a range of malicious modifications of the circuitry called Hardware Trojans. HTs can alter the …
Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of …
K Reshma, M Priyatharishini… - Soft Computing and Signal …, 2019 - Springer
A method to detect hardware Trojan in gate-level netlist is proposed using deep learning technique. The paper shows that it is easy to identify genuine nodes and Trojan-infected …
N Shang, A Wang, Y Ding, K Gai, L Zhu, G Zhang - Information Sciences, 2020 - Elsevier
Hardware Trojan detection has been becoming an attentive research subject since the first Trojan in real-world hardware was found. A common way to activate a hardware Trojan is to …
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various …
Globalization in the semiconductor industry enables fabless design houses to reduce their costs, save time, and make use of newer technologies. However, the offshoring of Integrated …
Z Shi, H Ma, Q Zhang, Y Liu, Y Zhao, J He - ACM Transactions on …, 2021 - dl.acm.org
Hardware Trojan (HT) is a major threat to the security of integrated circuits (ICs). Among various HT detection approaches, side channel analysis (SCA)-based methods have been …
SR Rajendran, F Farahmandi… - 2024 37th International …, 2024 - ieeexplore.ieee.org
In modern computer devices, System-on-Chip (SoC) technology is used to design hardware components. The most sensitive assets of a SoC design are the encryption key …
Abstract Insertions of Hardware Trojan result in unexpected harm to integrated circuits, and will change the characteristics of integrated circuits, such as thermal characteristics. In this …