Hardware Security in IoT Devices with Emphasis on Hardware Trojans
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu +2 more
doaj +4 more sources
Hardware Trojans in Chips: A Survey for Detection and Prevention. [PDF]
Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs.
Dong C +5 more
europepmc +2 more sources
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction ...
Sarwono Sutikno +3 more
doaj +2 more sources
Design and analysis of hardware Trojans in approximate circuits
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou +4 more
doaj +2 more sources
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) [PDF]
Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical.
Musharraf Hussain +6 more
doaj +2 more sources
A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study [PDF]
Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the ...
Varsha Kakkara +5 more
doaj +3 more sources
Locating Hardware Trojans Using Combinatorial Testing for Cryptographic Circuits
This paper presents a novel method for locating combinational hardware Trojans (HT) based on fault location approaches used in combinatorial testing.
Ludwig Kampel +2 more
doaj +2 more sources
An Unsupervised Detection Approach for Hardware Trojans
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated ...
Chen Dong +5 more
doaj +2 more sources
A dual mode self-test for a stand alone AES core. [PDF]
Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform's reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government.
Fakir Sharif Hossain +3 more
doaj +2 more sources
Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique [PDF]
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely ...
Jia Hou +3 more
doaj +2 more sources

