Filters








316 Hits in 3.2 sec

Integrated Sensor: A Backdoor for Hardware Trojan Insertions?

Xuan Thuy Ng, Zakaria Naj, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley
2015 2015 Euromicro Conference on Digital System Design  
We demonstrate that sensors, which are deployed to prevent faults, can be exploited to insert effective and almost zero-overhead hardware Trojans.  ...  Both the sensor can be used to trigger a powerful Trojan with minimal and at times zero overhead.  ...  But they also open a backdoor for another physical threat: Hardware Trojan (HT) attacks. The next section gives two case studies on HT insertion based on the presented integrated sensors.  ... 
doi:10.1109/dsd.2015.119 dblp:conf/dsd/NgoNBRDG15 fatcat:lhpmah6cmne4hmuzimkvfbrolq

Hardware Security in Sensor and its Networks

Mohammad Mezanur Rahman Monjur, Joseph Heacock, Joshua Calzadillas, MD Shaad Mahmud, John Roth, Kunal Mankodiya, Edward Sazonov, Qiaoyan Yu
2022 Frontiers in Sensors  
Presentable attacks—hardware Trojan attack, man-in-the-middle attack, jamming attack and replay attack—are examined in the context of sensing nodes deployed in a long-range wide-area network (LoRaWAN)  ...  for advanced manufacturing.  ...  The work Ng et al. (2015) reports that a sensor can be leveraged as a backdoor to trigger hardware Trojans.  ... 
doi:10.3389/fsens.2022.850056 fatcat:vsp5n4akejbornwtd47xqzlkou

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

Simranjeet Sidhu, Bassam J. Mohd, Thaier Hayajneh
2019 Journal of Sensor and Actuator Networks  
A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware.  ...  This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough.  ...  B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper.  ... 
doi:10.3390/jsan8030042 fatcat:zuzw6sf2hzgdfiz65p2joz2g6a

Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks

Maryam Jalalitabar, Marco Valero, Anu G. Bourgeois
2015 2015 24th International Conference on Computer Communication and Networks (ICCCN)  
The idea of hardware trojans in Wireless Sensor Networks (WSNs) has not been investigated before; thus, our goal is to demonstrate the potential threat that hardware trojans pose for sensor networks.  ...  These malicious modifications on the ICs are called hardware trojans (HWTs).  ...  Hardware Trojans The issue of trust is an emerging problem in integrated circuit (IC) security [13] .  ... 
doi:10.1109/icccn.2015.7288392 dblp:conf/icccn/JalalitabarVB15 fatcat:hhtkhzcosnac3lhkgjtv5seufq

A survey of hardware Trojan threat and defense

He Li, Qiang Liu, Jiliang Zhang
2016 Integration  
Hardware Trojan diagnosis Hardware Trojan prevention IC market model a b s t r a c t Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive  ...  Therefore, it is very important to analyze the specific HT threats existing in the whole life cycle of integrated circuits (ICs), and perform protection against hardware Trojans.  ...  by the National Natural Science Foundation of China under Grand nos. 61574099, 61232016, U1405254, 61303042, 61402162, 61402031 and the PAPD fund and Key Laboratory of Computer Network and Information Integration  ... 
doi:10.1016/j.vlsi.2016.01.004 fatcat:fms3p3j7m5f7flfpewrgbz5bpy

Hardware Trojans in Chips: A Survey for Detection and Prevention

Chen Dong, Yi Xu, Ximeng Liu, Fan Zhang, Guorong He, Yuzhong Chen
2020 Sensors  
Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality  ...  , leakage of information, even a denial of services (DoS), and so on.  ...  It is suitable for Hardware Trojan chips of specific pin-triggered  ... 
doi:10.3390/s20185165 pmid:32927772 fatcat:doxvl4ai3nfchgdji6zo7z4sdm

Hardware Trojans in Reconfigurable Computing

Qazi Arbab Ahmed
2021 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)  
I am sincerely grateful to the people of the CEG for providing such a pleasant and professional working environment during my stay.  ...  A special thanks goes to my colleague cum mentor Tobias Wiersema who has been there all the time for scientific discussions in a very professional way and also his help regarding social matters in Germany  ...  One such kind of attack for reconfigurable hardware has been presented in [26] by introducing a stealthy "malicious LUT" hardware Trojan inserted during design flow that employs a twostage mechanism of  ... 
doi:10.1109/vlsi-soc53125.2021.9606974 fatcat:udwjtbtd4vdsljv64s3qgsjeey

2021 Index IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Vol. 40

2021 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  ., +, TCAD Aug. 2021 1511-1524 Integrated circuits L Hardware Trojan Detection Using Backside Optical Imaging.  ...  ., +, TCAD Feb. 2021 315-325 OMNI: A Framework for Integrating Hardware and Software Optimizations for Sparse CNNs.  ... 
doi:10.1109/tcad.2021.3136047 fatcat:ppooj4g65nc2zonj7szclerc2y

Breakthrough Silicon Scanning Discovers Backdoor in Military Chip [chapter]

Sergei Skorobogatov, Christopher Woods
2012 Lecture Notes in Computer Science  
Using an innovative patented technique we were able to detect and analyse in the first documented case of its kind, a backdoor inserted into the Actel/Microsemi ProASIC3 chips for accessing FPGA configuration  ...  This paper is a short summary of the first real world detection of a backdoor in a military grade FPGA.  ...  Introduction With the globalisation of semiconductor manufacturing, integrated circuits become vulnerable to malevolent activities in the form of Trojan and backdoor insertion [1] .  ... 
doi:10.1007/978-3-642-33027-8_2 fatcat:tbcqe3s6ubhnnfholsxc6v5du4

Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead

Ujjwal Guin, Daniel DiMase, Mohammad Tehranipoor
2014 Journal of electronic testing  
A specialized service of testing, detection, and avoidance must be created to tackle the worldwide outbreak of counterfeit integrated circuits (ICs).  ...  So far, there are standards and programs in place for outlining the testing, documenting, and reporting procedures.  ...  The authors would like to thank Steve Walters of Honeywell, and the G-19A group members for providing valuable feedback on the defect taxonomy.  ... 
doi:10.1007/s10836-013-5430-8 fatcat:rc3dhmrkvjehffijcx3a5es6lu

Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain

Ujjwal Guin, Ke Huang, Daniel DiMase, John M. Carulli, Mohammad Tehranipoor, Yiorgos Makris
2014 Proceedings of the IEEE  
Anwar of the University of Connecticut (Storrs, CT, USA) for his comments on physical inspections.  ...  Acknowledgment The authors would like to thank Steve Walters of Honeywell (Clearwater, FL, USA) and Sultan Lilani of Integra Technologies (Wichita, KS, USA) for providing their valuable feedback on physical  ...  Path-delay fingerprinting, a method first introduced in [17] in the context of hardware Trojan detection, is adapted in [18] for detecting recycled ICs.  ... 
doi:10.1109/jproc.2014.2332291 fatcat:skydxiwgcrbzxa3p7mpqqvaf5y

Classification overview of the Hardware Trojans in digital circuits

Grigore Mihai Timis, Alexandru Valachi
2020 Analele Universităţii "Dunărea de Jos" Galaţi: Fascicula III, Electrotehnică, Electronică, Automatică, Informatică  
A malicious entity can introduce a Hardware Trojan (HT) into a design in order to denial of service, destroy or disable the system.  ...  The Hardware Trojan (HT) threats should be analyzed with maximum importance through the entire lifecycle of the integrated circuit (ICs).  ...  Fig. 1 . 1 Hardware Trojans taxonomy (sources:, Fig. 2 2 presents an overview of the Hardware Trojan Horse insertions into an Integrated Circuit (IC) using a presynthesis manipulation of the circuit's  ... 
doi:10.35219/eeaci.2020.3.02 fatcat:4hoywm37wbbfvgna27czgiooh4

A guest-transparent file integrity monitoring method in virtualization environment

Hai Jin, Guofu Xiang, Deqing Zou, Feng Zhao, Min Li, Chen Yu
2010 Computers and Mathematics with Applications  
Traditional real-time integrity monitoring tools, which insert hooks into the OS kernel, are easily controlled and disabled by malicious software.  ...  In this paper, we present a nonintrusive real-time file integrity monitoring method in virtual machine-based computing environment, which is transparent to the monitored system.  ...  File Integrity Monitoring (FIM) is one of the most popular approaches to observe hostile behaviors, such as modifying system log, appending backdoors, inserting Trojan horses.  ... 
doi:10.1016/j.camwa.2010.01.007 fatcat:eubo6ktevrcfbnsxaktbd7tnuu

Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]

Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia
2016 Computer  
In "Detecting Hard ware Trojans with Gate-Level Information-Flow Tracking," Wei Hu, Baolei Mao, Jason Oberg, and Ryan Kastner describe a unique approach for hardware Trojan detection in IP cores.  ...  Integrity for Electronics Defense (SHIELD) program.  ... 
doi:10.1109/mc.2016.260 fatcat:xh5zdbab7zfqloewzdydb2jgju

Hardware Security of Fog End-Devices for the Internet of Things

Ismail Butun, Alparslan Sari, Patrik Österberg
2020 Sensors  
Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem.  ...  Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated  ...  These may be subjected to malicious Hardware Trojan (HT) inserted by the untrusted chip manufacturers.  ... 
doi:10.3390/s20205729 pmid:33050165 pmcid:PMC7601476 fatcat:d7s5tovoefcoxl4jdxntyo6uxu
« Previous Showing results 1 — 15 out of 316 results