Articles with "hardware trojans" as a keyword



Photo by framesforyourheart from unsplash

Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3272034

Abstract: Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction and lower… read more here.

Keywords: hardware trojans; register transfer; level; detection ... See more keywords
Photo from wikipedia

On-Chip Magnetic Probes for Hardware Trojan Prevention and Detection

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Electromagnetic Compatibility"

DOI: 10.1109/temc.2020.3003728

Abstract: Security threats due to Hardware Trojans are growing in volume and variety. The miniature size of Trojans coupled with their diversity and their unpredictable effects made them difficult to detect. Researchers have proposed different techniques… read more here.

Keywords: probes hardware; chip magnetic; magnetic probes; hardware ... See more keywords
Photo from wikipedia

PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2021.3090060

Abstract: Owing to the various challenges looming over the integrated circuit (IC) supply chain for the sub-nm technology nodes, researchers are looking into emerging devices to design the next generation of high performance and low-power chips.… read more here.

Keywords: hardware trojans; polymorphic behavior; leveraging polymorphic; polyworm leveraging ... See more keywords
Photo from wikipedia

Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2019.2906547

Abstract: This paper describes a new physical side channel, i.e., the backscattering side channel, created by transmitting a signal toward the integrated circuits (ICs), where the internal impedance changes caused by on-chip switching activity modulate the… read more here.

Keywords: detection dormant; side channel; backscattering side; hardware trojans ... See more keywords
Photo by framesforyourheart from unsplash

Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2022.3171174

Abstract: Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans. These may arise when malafide third parties alter PCBs premanufacturing or postmanufacturing and are a concern in safety-critical applications, such as industrial control… read more here.

Keywords: pcbs using; hardware trojans; hardware; side ... See more keywords