A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Benchmarking of Hardware Trojans and Maliciously Affected Circuits
2017
Journal of Hardware and Systems Security
To this end, we have developed a suite of Trojans and 'trust benchmarks' (i.e., benchmark circuits with a hardware Trojan inserted in them) that can be used by researchers in the community to compare and ...
In this paper, we present a comprehensive vulnerability analysis flow at various levels of abstraction of digital-design, that has been utilized to create these trust benchmarks. ...
Vulnerability Analysis at the Layout Level In addition to performing vulnerability analysis at the netlist level, we have also implemented a unique flow to identify Trojan-insertion prone areas in a circuit ...
doi:10.1007/s41635-017-0001-6
dblp:journals/jhss/ShakyaHSFBT17
fatcat:ljfyrhk3yfcybdjybqg7et7gmq
On design vulnerability analysis and trust benchmarks development
2013
2013 IEEE 31st International Conference on Computer Design (ICCD)
We have developed a vulnerability analysis flow. ...
The flow determines hardto-detect areas in a circuit that would most probably be used for Trojan implementation to ensure a Trojan goes undetected during production test and extensive functional test analysis ...
We propose a design vulnerability analysis flow that determines which parts of a circuit are more susceptible to Trojan insertion. ...
doi:10.1109/iccd.2013.6657085
dblp:conf/iccd/SalmaniTK13
fatcat:aqt6j3ltebhxtgdscepvhxx52y
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
2008
2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems
In this paper, we propose a current integration methodology to observe Trojan activity in the circuit and a localized current analysis approach to isolate the Trojan. ...
This paper addresses a new threat to the security of integrated circuits (ICs). ...
We have generated the layout of the circuit and inserted the Trojan circuit in a dead space in the layout and connected the clock to the Trojan. ...
doi:10.1109/dft.2008.61
dblp:conf/dft/WangSTP08
fatcat:beoionkftjaiplqye2urpri35e
ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans
2020
2020 IEEE Symposium on Security and Privacy (SP)
ICAS takes a set of metrics that encode the challenge of inserting a hardware Trojan into an IC layout, a set of attacks that the defender cares about, and a completed IC layout and reports the number ...
To demonstrate ICAS' ability to reveal defensive gaps, we analyze over 60 layouts of three real-world hardware designs (a processor, AES and DSP accelerators), protected with existing defenses. ...
ACKNOWLEDGMENT We thank the anonymous reviewers, Ted Lyszczarz, Brian Tyrrell, and other members of the MIT Lincoln Laboratory community, for their thoughtful feedback that enhanced the quality of our ...
doi:10.1109/sp40000.2020.00083
dblp:conf/sp/TrippelSBH20
fatcat:4ny2her5uvdhxkckeywppqet3i
Detecting malicious inclusions in secure hardware: Challenges and solutions
2008
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. ...
We refer to such malicious alternations and inclusions as Hardware Trojans. ...
Below, we provide a list of applications that could potentially be targets for adversary to insert hardware Trojans. ...
doi:10.1109/hst.2008.4559039
dblp:conf/host/WangTP08
fatcat:7h7dsbjfgfcx3a7ssl3rrfdv7u
Ten years of hardware Trojans: a survey from the attacker's perspective
2020
IET Computers & Digital Techniques
In this paper, we attempt to make a review of the hardware Trojan design and implementations in the last decade and also provide an outlook. ...
In the last decade, hardware Trojan has emerged as a serious concern in integrated circuit (IC) industry. As such, hardware Trojan detection techniques have been studied extensively. ...
Universal Trojan and automatic Trojan insertion VS automatic Trojan (IC vulnerability) analysis tools Most HTs reported to date are manually inserted into a specific target circuit (119) . ...
doi:10.1049/iet-cdt.2020.0041
fatcat:7ugjmpblfjdippalfhovzmgaky
Security of Microfluidic Biochip
2020
ACM Transactions on Design Automation of Electronic Systems
We propose a systematic framework for applying Reverse Engineering (RE) attacks and Hardware Trojan (HT) attacks on MFBs as well as for practical countermeasures against the proposed attacks. ...
We evaluate the attacks and defense on various benchmarks where experimental results prove the effectiveness of our methods. Security metrics are defined to quantify the vulnerability of MFBs. ...
In Section 5.3, we demonstrate how to insert Trojans into the integrated logic circuit of DMFBs and reveal the vulnerabilities of DMFBs to Trojan attacks in FSM level. ...
doi:10.1145/3382127
fatcat:if3lf3sdkjf73gwsbcng7rxayi
Integrity at Every Link: A Roadmap to Trustworthy Hardware Supply Chains
2024
Zenodo
The involvement of numerous untrusted parties in the process opens the door to vulnerabilities. ...
Ensuring its integrity throughout the entirety of the hardware supply chain poses a significant challenge in establishing a secure computer system. ...
Moreover, approaches like code coverage analysis, structural analysis, and functional tests are employed to identify hardware Trojans [19][20] . ...
doi:10.5281/zenodo.10875049
fatcat:7dnc3zecz5h4lmy6ndc67uwpzy
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
2019
Journal of Sensor and Actuator Networks
A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. ...
This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. ...
B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper. ...
doi:10.3390/jsan8030042
fatcat:zuzw6sf2hzgdfiz65p2joz2g6a
A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits
2010
2010 IEEE International Workshop on Information Forensics and Security
The proposed method is aimed at improving the efficiency of power-based side-channel signal analysis techniques for detecting hardware Trojans. ...
This helps magnify the Trojan's contribution to the total circuit transient power by increasing Trojan-to-circuit switching activity (TCA) and power consumption. ...
Although approaches such as circuit delay analysis, full activation of Trojans, randomization-based probabilistic analysis, and extracting design characteristics are presented for hardware Trojan detection ...
doi:10.1109/wifs.2010.5711438
dblp:conf/wifs/SalmaniTP10
fatcat:u6i574rtyrgkfbjns4rwwh2hj4
A Survey of Hardware Trojan Detection, Diagnosis and Prevention
2015
2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)
Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may lead to huge economic losses ...
Therefore, it is very important to perform hardware Trojan detection and diagnosis, find potential safety hazards and apply protection techniques in the whole IC design cycle, in order to enhance the security ...
HARDWARE TROJAN THREAT AND VULNERABILITIES
A. ...
doi:10.1109/cadgraphics.2015.41
dblp:conf/cadgraphics/LiLZL15
fatcat:ktownmb45rdepnwoqhhky7b3ha
Hardware Trojans
2016
ACM Transactions on Design Automation of Electronic Systems
We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research. ...
A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art. ...
Moreover, the hardware Trojan vulnerability analysis can be extended to the system and layout level. ...
doi:10.1145/2906147
fatcat:24ffmzsrnbgkrkjq3ooztg4fbe
Detection of hardware Trojan in SEA using path delay
2014
2014 IEEE Students' Conference on Electrical, Electronics and Computer Science
The comparison of path delays makes small Trojan circuits significant from a delay point of view. ...
We inserted Trojan at different levels in the ASIC design flow of SEA crypto and most importantly we focused on Gate level and layout level Trojan insertions. ...
Compare to Gate-level the attacker has more possibility to insert Trojan at Layout-level. Due to the advancement of reverse engineering process layout of a chip can be acquired from GDSII. ...
doi:10.1109/sceecs.2014.6804444
fatcat:4qlmdmuuqre2rhm74frpszdpga
An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan
2017
IEICE transactions on information and systems
Due to outsourcing of numerous stages of the IC manufacturing process to different foundries, the security risk, such as hardware Trojan becomes a potential threat. ...
In this paper, we present a layout aware localized hardware Trojan detection method that magnifies the detection sensitivity for small Trojan in power-based side-channel analysis. ...
This option enables to insert Trojan without changing the layout of the original circuit and Trojan cells are inserted close to the wires that connect Trojans and the original circuit. ...
doi:10.1587/transinf.2016edp7246
fatcat:66cfkozxaza77gbx4ig2ls4bji
A survey of hardware Trojan threat and defense
2016
Integration
Hardware Trojan diagnosis Hardware Trojan prevention IC market model a b s t r a c t Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive ...
Therefore, it is very important to analyze the specific HT threats existing in the whole life cycle of integrated circuits (ICs), and perform protection against hardware Trojans. ...
Laboratory of Computer Network and Information Integration (Southeast University), Ministry of Education. ...
doi:10.1016/j.vlsi.2016.01.004
fatcat:fms3p3j7m5f7flfpewrgbz5bpy
« Previous
Showing results 1 — 15 out of 442 results