Safety and security in cyber-physical systems and internet-of-things systems

M Wolf, D Serpanos - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
Safety and security have traditionally been distinct problems in engineering and computer
science. The introduction of computing elements to create cyber-physical systems (CPSs) …

Exciting FPGA cryptographic Trojans using combinatorial testing

P Kitsos, DE Simos, J Torres-Jimenez… - 2015 IEEE 26th …, 2015 - ieeexplore.ieee.org
Contemporary hardware design shares many similarities with software development. The
injection of malicious functionality (Trojans) in FPGA designs is a realistic threat. Established …

On the limitations of logic testing for detecting hardware Trojans horses

ML Flottes, S Dupuis, PS Ba… - 2015 10th International …, 2015 - ieeexplore.ieee.org
The insertion of malicious alterations to a circuit, referred to as Hardware Trojan Horses
(HTH), is a threat considered more and more seriously in the last years. Several methods …

FPGA Trojan detection using length-optimized ring oscillators

P Kitsos, AG Voyiatzis - 2014 17th Euromicro Conference on …, 2014 - ieeexplore.ieee.org
Hardware Trojan horses are a realistic threat for both ASIC and FPGA systems. Ring
Oscillators (ROs) can be used to detect the presence of malicious hardware functionality …

Efficient triggering of Trojan hardware logic

AG Voyiatzis, KG Stefanidis… - 2016 IEEE 19th …, 2016 - ieeexplore.ieee.org
The detection of malicious hardware logic (hardware Trojan) requires test patterns that
succeed in exciting the malicious logic part. Testing of all possible input patterns is often …

Thermal sensor based hardware Trojan detection in FPGAs

L Pyrgas, F Pirpilidis, A Panayiotarou… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
This paper introduces an efficient technique for the detection of malicious hardware, based
on thermal sensors. Each sensor consists of a Ring Oscillator with three inverters, a control …

An efficient multi-parameter approach for FPGA hardware Trojan detection

AP Fournaris, L Pyrgas, P Kitsos - Microprocessors and Microsystems, 2019 - Elsevier
Hardware Trojan (HT) detection in the wild is a challenging endeavor since the inspector
cannot have access to “golden chips” or special and trusted test measurements in order to …

An efficient triggering method of hardware Trojan in AES cryptographic circuit

X Chuan, Y Yan, Y Zhang - 2017 2nd IEEE International …, 2017 - ieeexplore.ieee.org
The cryptographic chip is widely used in government, military, finance, business and other
fields, so the requirement of security is very high. The globalization of the integrated circuit …

An fpga hardware trojan detection approach based on multiple parameter analysis

AP Fournaris, L Pyrgas, P Kitsos - 2018 21st Euromicro …, 2018 - ieeexplore.ieee.org
In this paper an FPGA Hardware Trojan (HT) detection approach based on multiple
parameter analysis is proposed. In this direction, we apply a logic testing method, a run-time …

Ring oscillators and hardware Trojan detection

P Kitsos, N Sklavos, AG Voyiatzis - … and Trust: Design and Deployment of …, 2017 - Springer
Hardware Trojan horses is a realistic threat in the modern IC supply chain. Once the
associate risk is considered, appropriate defense mechanisms must be designed and …