Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

被引:0
|
作者
Yu, Qiaoyan [1 ]
Dofe, Jaya [1 ]
Zhang, Zhiming [1 ]
机构
[1] Department of Electrical and Computer Engineering, University of New Hampshire, Durham,NH,03824, United States
来源
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
8053049
中图分类号
学科分类号
摘要
Evaluation metrics - Hardware implementations - Hardware obfuscations - Late stage - Semiconductor supply chain - State of the art - Various attacks
引用
收藏
页码:819 / 822
相关论文
共 50 条
  • [31] Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge
    Becker, Georg T.
    Lakshminarasimhan, Ashwin
    Lin, Lang
    Srivathsa, Sudheendra
    Suresh, Vikram B.
    Burelson, Wayne
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 301 - 304
  • [32] FPGA SoC Architecture and Runtime to Prevent Hardware Trojans from Leaking Secrets
    Bloom, Gedare
    Narahari, Bhagirath
    Simha, Rahul
    Namazi, Ali
    Levy, Renato
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 48 - 51
  • [33] Exploiting hardware capabilities in interior point methods
    Meszaros, Csaba
    OPTIMIZATION METHODS & SOFTWARE, 2016, 31 (02): : 435 - 443
  • [34] Program Obfuscation with Leaky Hardware
    Bitansky, Nir
    Canetti, Ran
    Goldwasser, Shafi
    Halevi, Shai
    Kalai, Yael Tauman
    Rothblum, Guy N.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 722 - +
  • [35] Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware
    Li, Zeyu
    Wang, Junjie
    Huang, Zhao
    Luo, Nan
    Wang, Quan
    APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [36] Hardware Trojans in eNVM Neuromorphic Devices
    Wu, Lingxi
    Sreekumar, Rahul
    Sharifi, Rasool
    Skadron, Kevin
    Stan, Mircea R.
    Venkat, Ashish
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [37] Potential Trigger Detection for Hardware Trojans
    Zou, Minhui
    Cui, Xiaotong
    Shi, Liang
    Wu, Kaijie
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (07) : 1384 - 1395
  • [38] An Unsupervised Detection Approach for Hardware Trojans
    Dong, Chen
    Liu, Yulin
    Chen, Jinghui
    Liu, Ximeng
    Guo, Wenzhong
    Chen, Yuzhong
    IEEE ACCESS, 2020, 8 : 158169 - 158183
  • [39] Hardware Trojans Inspired IP Watermarks
    Shayan, Mohammed
    Basu, Kanad
    Karri, Ramesh
    IEEE DESIGN & TEST, 2019, 36 (06) : 72 - 79
  • [40] Stealth Assessment of Hardware Trojans in a Microcontroller
    Reece, Trey
    Limbrick, Daniel B.
    Wang, Xiaowen
    Kiddie, Bradley T.
    Robinson, William H.
    2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, : 139 - 142