A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps
2014
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
In this paper, we propose a completely new post-silicon multimodal approach using runtime thermal and power maps for Trojan detection and localization. ...
We introduce 1 regularization in the thermal to power inversion procedure which improves Trojan detection accuracy. ...
Our proposed detection method utilizes these very high resolution thermal and power maps in order to detect IC Trojans which results into a very high sensitivity Trojan detection technique.
III. ...
doi:10.1109/tcad.2014.2354293
fatcat:mxguhksnsfbpzanvrm6kd5em3u
High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization
2013
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013
In this paper, we present new accurate methods for Trojan detection that are based upon post-silicon multimodal thermal and power characterization techniques. ...
Our approach first estimates the detailed post-silicon spatial power consumption using thermal maps of the IC, then applies 2DPCA to extract features of the spatial power consumption, and finally uses ...
Acknowledgments: This work is partially supported by NSF grant numbers 1115424 and 1116858. ...
doi:10.7873/date.2013.263
dblp:conf/date/HuNRK13
fatcat:bf7swv6sqrbjtavcg4ry6z6oje
Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric – Detection Methodology and Mitigation
2020
IEEE Access
Accordingly, we present a comprehensive FPGA security scheme, comprising novel elements of hardware Trojan infection, detection, and mitigation, to protect FPGA applications against the hardware Trojan ...
The hardware Trojan detection sub-scheme provides a unique lightweight threshold voltage-aware sensor with a detection sensitivity of 0.251mV/nA. ...
SENSOR AND HARDWARE TROJAN DETECTION SCHEME -TESTING AND ANALYSIS The correct verification of the effectiveness and sensitivity of threshold voltage based sensor for a hardware Trojan detection scheme ...
doi:10.1109/access.2020.2973260
fatcat:n2kjanchovhqhbpxaytynf65jy
Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
[article]
2022
arXiv
pre-print
This paper presents a method for hardware trojan detection in integrated circuits. ...
QDM magnetic imaging is enhanced using quantum control techniques and improved diamond material to increase magnetic field sensitivity by a factor of 4 and measurement speed by a factor of 16 over previous ...
BACKGROUND
Hardware Trojan Detection Prior research on nondestructive methods for hardware trojan detection spans functional testing, side channel testing, and use of localized detection circuitry within ...
arXiv:2204.14228v1
fatcat:gnousig5gzdihgqmkcrkqtakra
Hardware Trojan Attacks: Threat Analysis and Countermeasures
2014
Proceedings of the IEEE
This paper is a survey of the state-of-the-art Trojan attacks, modeling, and countermeasures. ...
Region-based approach using current measurements from multiple power ports can be used for isolating Trojan effect with high sensitivity [40] . ...
Such a temporal selfreferencing approach can provide high detection sensitivity for Trojans of varying sizes. ...
doi:10.1109/jproc.2014.2334493
fatcat:kxnyfwrk6jgqrmdpga33odvofq
Intelligent Electromagnetic Sensors for Non-Invasive Trojan Detection
2021
Sensors
Many devices at the extreme edge collect and transmit sensitive information wirelessly for remote computing. ...
The built-in threat detection approach using the intelligent EM sensors distributed on the power lines is developed to detect abnormal data activities without degrading the performance while achieving ...
Hardware Trojan Detection Hardware trojan detection methods are broadly categorized as destructive and nondestructive [11, 12] . ...
doi:10.3390/s21248288
pmid:34960382
pmcid:PMC8708266
fatcat:2kp2lrthebhv5ixzabfbhnpxca
A Survey on Hardware Vulnerability Analysis Using Machine Learning
2022
IEEE Access
There are recent surveys on hardware Trojan detection using machine learning. ...
To the best of our knowledge, there are no comprehensive surveys on utilization of machine learning techniques for detection and mitigation of a wide variety of hardware vulnerabilities including malicious ...
SCA is typically used for hardware Trojan detection in integrated circuits by analyzing various sidechannel signatures, such as timing, power and path delay. ...
doi:10.1109/access.2022.3173287
fatcat:yri7ggwdnjffzmpgojiuvr54ta
On Reliability Trojan Injection and Detection
2012
Journal of Low Power Electronics
In this paper we present examples of such reliability Trojans and describe testing approaches for detecting these reliability tampering attempts. ...
This raises the question of trustable manufactured products for highly sensitive applications. ...
Perform N-detect test for each such rare nodesFig. 11. Rare event identification and test pattern generation technique.
Table I . I Trojan circuit area and power consumption. ...
doi:10.1166/jolpe.2012.1225
fatcat:4uesxkklyjf7jlj6qkjbfkiy6m
Towards Energy-Efficient and Secure Computing Systems
2018
Journal of Low Power Electronics and Applications
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient ...
This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency. ...
We use power consumption per effective packet delivery as a metric to compare different Trojan detection and mitigation methods for NoCs. ...
doi:10.3390/jlpea8040048
fatcat:o4gs7zqkyveyflqcp4zioge63i
Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise
2016
Journal of electronic testing
Side-channel analysis has emerged as an effective approach for detection of hardware Trojans. ...
Since it uses a chip as a reference to itself, the method completely eliminates the effect of process noise and other design marginalities (e.g. capacitive coupling), thus providing high detection sensitivity ...
Since for any S x , corresponding T x (s) exists: it can be stated that: P ower e,k,n = P ower e,k,n+1 . ...
doi:10.1007/s10836-016-5632-y
fatcat:tqg3mhnw35fnnmsp4zrevkxtiq
Hardware Trojans in Chips: A Survey for Detection and Prevention
2020
Sensors
In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. ...
Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality ...
the redundant thermal map. ...
doi:10.3390/s20185165
pmid:32927772
fatcat:doxvl4ai3nfchgdji6zo7z4sdm
Paper Title
2021
2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)
Smart vehicle monitoring for detecting anomalies on CAN bus A MUX based Latch Technique for the detection of Hardware Trojan using Path Delay Analysis Empirical Performance Analysis of Speech Based Age ...
model over a cell in wireless network for efficient resource planning Thermal Aware Power Save Policy For Hot And Cold Jobs Channel Model for Indian Regional Navigation Satellite System (IRNSS) using ...
doi:10.1109/conecct52877.2021.9622649
fatcat:y65u5a3sqrg2jmi74gebh5mjc4
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs
2021
PLoS ONE
Additive White Gaussian Channel (AWGN) and developed a Cyclic Prefix (CP) checker based detection mechanism named "SENTRY" to detect such trojans once it is triggered. ...
Over the last decade, extensive research has been carried on HT detection methods for digital circuits. ...
Acknowledgments We gratefully acknowledge that this research work has been performed using all the facilities of the embedded system laboratory of IICT, BUET. ...
doi:10.1371/journal.pone.0254903
pmid:34324521
pmcid:PMC8321131
fatcat:5z5k6ic4wzfylo55bdq5xprgvq
Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network
[article]
2022
arXiv
pre-print
The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications known as Hardware Trojans (HTs). ...
Afterward, the graph convolution performs automatic feature extraction for nodes to classify the nodes as Trojan or benign. ...
precision Symbolic algebra [2] Pre-S No No High High HT localization with 100% recall and 74% precision Thermal map [3] Post-S results on their limited sets of benchmarks. ...
arXiv:2207.06664v1
fatcat:ynfzmkg3mfbejm6g3cln5y6jx4
A Survey on Machine Learning against Hardware Trojan Attacks: Recent Advances and Challenges
2020
IEEE Access
INDEX TERMS Machine learning, hardware Trojan detection, design-for-security, bus security, secure architecture. 10796 This work is licensed under a Creative Commons Attribution 4.0 License. ...
In particular, we first provide a classification of all possible HT attacks and then review recent developments from four perspectives, i.e., HT detection, design-for-security (DFS), bus security, and ...
Dang, and so on for their suggestions during the revision of the article. ...
doi:10.1109/access.2020.2965016
fatcat:dqh376eosnefbl4pyk6ad4sxjq
« Previous
Showing results 1 — 15 out of 212 results