SoK: Physical and Logic Testing Techniques for Hardware Trojan Detection
暂无分享,去创建一个
Rajat Subhra Chakraborty | Sree Ranjani Rajendran | Rijoy Mukherjee | R. Chakraborty | S. Rajendran | R. Mukherjee
[1] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[2] M. Nirmala Devi,et al. Malicious hardware detection and design for trust: An analysis , 2017 .
[3] Sylvain Guilley,et al. Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[4] Mark Mohammad Tehranipoor,et al. RON: An on-chip ring oscillator network for hardware Trojan detection , 2011, 2011 Design, Automation & Test in Europe.
[5] Mark Mohammad Tehranipoor,et al. Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90nm ASIC , 2012, 2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[6] Azadeh Davoodi,et al. A sensor-assisted self-authentication framework for hardware trojan detection , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[7] Michael S. Hsiao,et al. Trusted RTL: Trojan detection methodology in pre-silicon designs , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[8] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.
[9] Kaushik Roy,et al. Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[10] Milos Prvulovic,et al. Near-Field Backscattering-Based Sensing for Hardware Trojan Detection , 2020, IEEE Transactions on Antennas and Propagation.
[11] M. Nirmala Devi,et al. Golden-chip free power metric based hardware trojan detection and diagnosis , 2017 .
[12] Enamul Amyeen,et al. Evaluation of the quality of N-detect scan ATPG patterns on a processor , 2004, 2004 International Conferce on Test.
[13] John Lach,et al. Performance of delay-based Trojan detection techniques under parameter variations , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[14] Yiqiang Zhao,et al. Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[15] Yu Liu,et al. Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[16] James F. Plusquellic,et al. Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[17] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[18] Prabhat Mishra,et al. Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[19] Swarup Bhunia,et al. Scalable Test Generation for Trojan Detection Using Side Channel Analysis , 2018, IEEE Transactions on Information Forensics and Security.
[20] Michael S. Hsiao,et al. Guided test generation for isolation and detection of embedded trojans in ics , 2008, GLSVLSI '08.
[21] Sandeep K. Gupta,et al. Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[22] Giorgio Di Natale,et al. New testing procedure for finding insertion sites of stealthy Hardware Trojans , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[23] Farinaz Koushanfar,et al. High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[24] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[25] Ingrid Verbauwhede,et al. Electromagnetic circuit fingerprints for Hardware Trojan detection , 2015, 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC).
[26] Georg Sigl,et al. Hardware Trojans: current challenges and approaches , 2014, IET Comput. Digit. Tech..
[27] Ramesh Karri,et al. Hardware Trojan Detection Using the Order of Path Delay , 2018, ACM J. Emerg. Technol. Comput. Syst..
[28] James F. Plusquellic,et al. GDS-II Trojan detection using multiple supply pad VDD and GND IDDQs in ASIC functional units , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[29] Farinaz Koushanfar,et al. Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[30] Swarup Bhunia,et al. Hardware IP Security and Trust , 2017 .
[31] Mark Mohammad Tehranipoor,et al. Case study: Detecting hardware Trojans in third-party digital IP cores , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[32] Giorgio Di Natale,et al. Using outliers to detect stealthy hardware trojan triggering? , 2016, 2016 1st IEEE International Verification and Security Workshop (IVSW).
[33] T. Saran,et al. A region based fingerprinting for hardware Trojan detection and diagnosis , 2017, 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN).
[34] Jian Wang,et al. A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[35] Yu Zheng,et al. SeMIA: Self-Similarity-Based IC Integrity Analysis , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[36] Mark Mohammad Tehranipoor,et al. Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution , 2013, IEEE Design & Test.
[37] Mark Mohammad Tehranipoor,et al. On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).
[38] Milos Prvulovic,et al. Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[39] James F. Plusquellic,et al. On detecting delay anomalies introduced by hardware Trojans , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[40] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[41] Swarup Bhunia,et al. The Hardware Trojan War Attacks, Myths, and Defenses , 2018 .
[42] Prabhat Mishra,et al. Efficient Test Generation for Trojan Detection using Side Channel Analysis , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[43] Debdeep Mukhopadhyay,et al. Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability , 2015, CHES.
[44] Jian Wang,et al. An enhanced classification-based golden chips-free hardware Trojan detection technique , 2016, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST).
[45] Norimasa Yoshimizu. Hardware trojan detection by symmetry breaking in path delays , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[46] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[47] M. Tehranipoor,et al. Hardware Trojans: Lessons Learned after One Decade of Research , 2016, TODE.
[48] Phillip H. Jones,et al. Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).
[49] Jian Wang,et al. Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans , 2019, IEEE Internet of Things Journal.
[50] Ankur Srivastava,et al. Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[51] Susmit Jha,et al. Randomization Based Probabilistic Approach to Detect Trojan Circuits , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[52] Paris Kitsos,et al. Efficient triggering of Trojan hardware logic , 2016, 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS).
[53] Jian Wang,et al. Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs , 2019, IET Comput. Digit. Tech..
[54] Bruno Robisson,et al. Resilient hardware Trojans detection based on path delay measurements , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[55] Mark Mohammad Tehranipoor,et al. Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis , 2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems.
[56] Farinaz Koushanfar,et al. A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection , 2011, IEEE Transactions on Information Forensics and Security.
[57] Philippe Maurine,et al. An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[58] Ankur Srivastava,et al. Temperature tracking: An innovative run-time approach for hardware Trojan detection , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[59] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[60] Swarup Bhunia,et al. MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection , 2016, CCS.
[61] Mark Mohammad Tehranipoor,et al. Benchmarking of Hardware Trojans and Maliciously Affected Circuits , 2017, Journal of Hardware and Systems Security.
[62] Alex Orailoglu,et al. Test Pattern Superposition to Detect Hardware Trojans , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[63] Qiang Liu,et al. A survey of hardware Trojan threat and defense , 2016, Integr..
[64] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[65] PlusquellicJim,et al. Detecting Trojans through leakage current analysis using multiple supply pad IDDQS , 2010 .
[66] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.
[67] Bo Hou,et al. Hardware Trojan detection via current measurement: A method immune to process variation effects , 2014, 2014 10th International Conference on Reliability, Maintainability and Safety (ICRMS).
[68] Sylvain Guilley,et al. Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis , 2016, Journal of Cryptographic Engineering.
[69] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[70] Saiyu Ren,et al. Self-Reference-Based Hardware Trojan Detection , 2018, IEEE Transactions on Semiconductor Manufacturing.
[71] Apostolos P. Fournaris,et al. An FPGA Hardware Trojan Detection Approach Based on Multiple Parameter Analysis , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).
[72] Dhruva Acharyya,et al. Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$s , 2010, IEEE Transactions on Information Forensics and Security.
[73] Alp Arslan Bayrakci,et al. Hardware Trojan detection based on correlated path delays in defiance of variations with spatial correlations , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[74] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.
[75] Wei He,et al. Supervised and unsupervised machine learning for side-channel based Trojan detection , 2016, 2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP).
[76] Swarup Bhunia,et al. Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.
[77] Jie Zhang,et al. HTOutlier: Hardware Trojan detection with side-channel signature outlier identification , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[78] Shahram Etemadi Borujeni,et al. A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement , 2018, J. Circuits Syst. Comput..
[79] Lawrence L. Harada. Semiconductor Technology and U.S. National Security , 2010 .
[80] Prabhat Mishra,et al. Hardware Trojan Detection Using ATPG and Model Checking , 2018, 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID).
[81] Bruno Rouzeyre,et al. Protection Against Hardware Trojans With Logic Testing: Proposed Solutions and Challenges Ahead , 2018, IEEE Design & Test.
[82] Michael Hutter,et al. EM-based detection of hardware trojans on FPGAs , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[83] Mark Mohammad Tehranipoor,et al. Sensitivity analysis to hardware Trojans using power supply transient signals , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[84] Swarup Bhunia,et al. TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[85] Swarup Bhunia,et al. The Hardware Trojan War , 2018 .
[86] Youhua Shi,et al. Hardware Trojan Detection Utilizing Machine Learning Approaches , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).