hardware trust
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 2)

H-INDEX

6
(FIVE YEARS 0)

2021 ◽  
Vol 17 (4) ◽  
pp. 1-53
Author(s):  
Ulbert J. Botero ◽  
Ronald Wilson ◽  
Hangwei Lu ◽  
Mir Tanjidur Rahman ◽  
Mukhil A. Mallaiyan ◽  
...  

In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent components. Hence, it can raise serious issues concerning Intellectual Property (IP) infringement, the (in)effectiveness of security-related measures, and even new opportunities for injecting hardware Trojans. Ironically, reverse engineering can enable IP owners to verify and validate the design. Nevertheless, this cannot be achieved without overcoming numerous obstacles that limit successful outcomes of the reverse engineering process. This article surveys these challenges from two complementary perspectives: image processing and machine learning. These two fields of study form a firm basis for the enhancement of efficiency and accuracy of reverse engineering processes for both PCBs and ICs. In summary, therefore, this article presents a roadmap indicating clearly the actions to be taken to fulfill hardware trust and assurance objectives.


2018 ◽  
Vol 58 ◽  
pp. 24-33
Author(s):  
Najmeh Farajipour Ghohroud ◽  
Shaahin Hessabi

2017 ◽  
pp. 183-202
Author(s):  
Farimah Farahmandi ◽  
Yuanwen Huang ◽  
Prabhat Mishra
Keyword(s):  

2017 ◽  
pp. 227-253
Author(s):  
Qiang Xu ◽  
Lingxiao Wei
Keyword(s):  

Author(s):  
Papa-Sidy Ba ◽  
Sophie Dupuis ◽  
Manikandan Palanichamy ◽  
Marie-Lise Flottes ◽  
Giorgio Di Natale ◽  
...  

2015 ◽  
Vol 24 (08) ◽  
pp. 1550115 ◽  
Author(s):  
Seyed Mohammad Hossein Shekarian ◽  
Morteza Saheb Zamani

During the last few years, hardware Trojan horses (HTHs) have become one of the most important threats to the security of very large scale integrated (VLSI) chips. Many efforts have been made to facilitate the process of HTH detection, mostly based on the power analysis of chips. The techniques would be more beneficial if trust-driven techniques are used during the system design. Whereas design for hardware trust (DFHT) is one of the fields of interest, most current approaches include ad-hoc and gate-level design techniques. This paper discusses the advantage of physical-level design approaches with integrated strategies for improving the HTH-detection probability. As a proof of concept, a placement technique is presented with the goal of enhancing the ability of HTH detection techniques based on local power signal analysis. Our results show that the background effects on power pads can be leveraged by a simple partitioning-based placement algorithm. Minimizing the background effects leads to a better Trojan-to-background-effect ratio and more (by about 1.7 times) Trojan detectability.


Author(s):  
Jie Zhang ◽  
Feng Yuan ◽  
Linxiao Wei ◽  
Yannan Liu ◽  
Qiang Xu
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document