A multi-layer hardware trojan protection framework for IoT chips

C Dong, G He, X Liu, Y Yang, W Guo - IEEE Access, 2019 - ieeexplore.ieee.org
Since integrated circuits are performed by several untrusted manufacturers, malicious
circuits (hardware Trojans) can be implanted in any stage of the Internet-of-Things (IoT) …

Hardware trojan detection using an advised genetic algorithm based logic testing

MA Nourian, M Fazeli, D Hély - Journal of Electronic Testing, 2018 - Springer
Today, outsourced manufacturing of integrated circuit designs are prone to a range of
malicious modifications of the circuitry called Hardware Trojans. HTs can alter the …

Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities beneath Software

SR Rajendran, NF Dipu, S Tarek… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Due to the increasing size and complexity of system-on-chips (SoCs), new threats and
vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of …

Hardware trojan detection using deep learning technique

K Reshma, M Priyatharishini… - Soft Computing and Signal …, 2019 - Springer
A method to detect hardware Trojan in gate-level netlist is proposed using deep learning
technique. The paper shows that it is easy to identify genuine nodes and Trojan-infected …

A machine learning based golden-free detection method for command-activated hardware Trojan

N Shang, A Wang, Y Ding, K Gai, L Zhu, G Zhang - Information Sciences, 2020 - Elsevier
Hardware Trojan detection has been becoming an attentive research subject since the first
Trojan in real-world hardware was found. A common way to activate a hardware Trojan is to …

Data augmented hardware trojan detection using label spreading algorithm based transductive learning for edge computing-assisted IoT devices

V Sankar, MN Devi, M Jayakumar - IEEE Access, 2022 - ieeexplore.ieee.org
IoT devices handle a large amount of information including sensitive information pertaining
to the deployed application. Such a scenario, makes IoT devices susceptible to various …

Reusing verification assertions as security checkers for hardware trojan detection

M Eslami, T Ghasempouri… - 2022 23rd International …, 2022 - ieeexplore.ieee.org
Globalization in the semiconductor industry enables fabless design houses to reduce their
costs, save time, and make use of newer technologies. However, the offshoring of Integrated …

Test generation for hardware trojan detection using correlation analysis and genetic algorithm

Z Shi, H Ma, Q Zhang, Y Liu, Y Zhao, J He - ACM Transactions on …, 2021 - dl.acm.org
Hardware Trojan (HT) is a major threat to the security of integrated circuits (ICs). Among
various HT detection approaches, side channel analysis (SCA)-based methods have been …

CAD tools pathway in hardware security

SR Rajendran, F Farahmandi… - 2024 37th International …, 2024 - ieeexplore.ieee.org
In modern computer devices, System-on-Chip (SoC) technology is used to design hardware
components. The most sensitive assets of a SoC design are the encryption key …

Thermal images based Hardware Trojan detection through differential temperature matrix

J Zhong, J Wang - Optik, 2018 - Elsevier
Abstract Insertions of Hardware Trojan result in unexpected harm to integrated circuits, and
will change the characteristics of integrated circuits, such as thermal characteristics. In this …