Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

被引:0
|
作者
Yu, Qiaoyan [1 ]
Dofe, Jaya [1 ]
Zhang, Zhiming [1 ]
机构
[1] Department of Electrical and Computer Engineering, University of New Hampshire, Durham,NH,03824, United States
来源
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
8053049
中图分类号
学科分类号
摘要
Evaluation metrics - Hardware implementations - Hardware obfuscations - Late stage - Semiconductor supply chain - State of the art - Various attacks
引用
收藏
页码:819 / 822
相关论文
共 50 条
  • [21] An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification
    Lecomte, Maxime
    Fournier, Jacques
    Maurine, Philippe
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) : 3317 - 3330
  • [22] A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware
    Ito, Akira
    Ueno, Rei
    Homma, Naofumi
    2021 IEEE 51ST INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2021), 2021, : 154 - 159
  • [23] Hardware Trojans and Smart Manufacturing - A Hardware Security Perspective
    Aslam, Sohaib
    Samie, Mohammad
    Jennions, Ian K.
    ADVANCES IN MANUFACTURING TECHNOLOGY XXXII, 2018, 8 : 305 - 310
  • [25] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size
    S. M. Sebt
    A. Patooghy
    H. Beitollahi
    Journal of Electronic Testing, 2019, 35 : 839 - 852
  • [26] Hardware Security in IoT Devices with Emphasis on Hardware Trojans
    Sidhu, Simranjeet
    Mohd, Bassam J.
    Hayajneh, Thaier
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (03)
  • [27] Hardware Enlightening: No Where to Hide Your Hardware Trojans!
    Samimi, Mohammad Saleh
    Aerabi, Ehsan
    Kazemi, Zahra
    Fazeli, Mahdi
    Patooghy, Ahmad
    2016 IEEE 22ND INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2016, : 251 - 256
  • [28] Targeted modification of hardware trojans
    Jason R. Hamlet
    Jackson R. Mayo
    Vivian G. Kammler
    Journal of Hardware and Systems Security, 2019, 3 (2) : 189 - 197
  • [29] Hardware Trojans in Reconfigurable Computing
    Ahmed, Qazi Arbab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 182 - 183
  • [30] Exploiting Error Control Approaches for Hardware Trojans on Network-on-Chip Links
    Yu, Qiaoyan
    Frey, Jonathan
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2013, : 266 - 271