Gate-level characterization: foundations and hardware security applications
Proceedings of the 47th Design Automation Conference
Synthesis of trustable ICs using untrusted CAD tools
Proceedings of the 47th Design Automation Conference
ACM SIGDA Newsletter
Hardware trust implications of 3-D integration
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context
Wireless Personal Communications: An International Journal
Scalable segmentation-based malicious circuitry detection and diagnosis
Proceedings of the International Conference on Computer-Aided Design
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Dependable and Historic Computing
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry
Proceedings of the 49th Annual Design Automation Conference
Can EDA combat the rise of electronic counterfeiting?
Proceedings of the 49th Annual Design Automation Conference
EDA for secure and dependable cybercars: challenges and opportunities
Proceedings of the 49th Annual Design Automation Conference
Breakthrough silicon scanning discovers backdoor in military chip
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Experimental analysis of a ring oscillator network for hardware trojan detection in a 90nm ASIC
Proceedings of the International Conference on Computer-Aided Design
Provably complete hardware trojan detection using test point insertion
Proceedings of the International Conference on Computer-Aided Design
Energy attacks and defense techniques for wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the Conference on Design, Automation and Test in Europe
High-sensitivity hardware trojan detection using multimodal characterization
Proceedings of the Conference on Design, Automation and Test in Europe
Reverse engineering digital circuits using functional analysis
Proceedings of the Conference on Design, Automation and Test in Europe
VeriTrust: verification for hardware trust
Proceedings of the 50th Annual Design Automation Conference
The undetectable and unprovable hardware trojan horse
Proceedings of the 50th Annual Design Automation Conference
Scalable hardware trojan diagnosis
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Run-time prediction and preemption of configuration attacks on embedded process controllers
Proceedings of the First International Conference on Security of Internet of Things
Detection of trojans using a combined ring oscillator network and off-chip transient power analysis
ACM Journal on Emerging Technologies in Computing Systems (JETC)
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
A sensor-assisted self-authentication framework for hardware trojan detection
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Towards reducing the attack surface of software backdoors
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hardware trojan design and detection: a practical evaluation
Proceedings of the Workshop on Embedded Systems Security
SEC'13 Proceedings of the 22nd USENIX conference on Security
Temperature tracking: an innovative run-time approach for hardware Trojan detection
Proceedings of the International Conference on Computer-Aided Design
Hardware security: threat models and metrics
Proceedings of the International Conference on Computer-Aided Design
Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead
Journal of Electronic Testing: Theory and Applications
A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment
Journal of Electronic Testing: Theory and Applications
Hi-index | 0.00 |
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.—Krish Chakrabarty, Editor in Chief