Logical effort: designing fast CMOS circuits
Logical effort: designing fast CMOS circuits
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Parameter variations and impact on circuits and microarchitecture
Proceedings of the 40th annual Design Automation Conference
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Analysis and modeling of CD variation for statistical static timing
Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design
Micro power meter for energy monitoring of wireless sensor networks at scale
Proceedings of the 6th international conference on Information processing in sensor networks
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Trojan Detection using IC Fingerprinting
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Circuit Failure Prediction and Its Application to Transistor Aging
VTS '07 Proceedings of the 25th IEEE VLSI Test Symmposium
CAD-based security, cryptography, and digital rights management
Proceedings of the 44th annual Design Automation Conference
Proceedings of the 5th international conference on Embedded networked sensor systems
The Energy Endoscope: Real-Time Detailed Energy Accounting for Wireless Sensor Nodes
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Proceedings of the 45th annual Design Automation Conference
Towards trojan-free trusted ICs: problem analysis and detection scheme
Proceedings of the conference on Design, automation and test in Europe
At-speed delay characterization for IC authentication and Trojan Horse detection
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
A region based approach for the identification of hardware Trojans
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Hardware Trojan detection using path delay fingerprint
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs
HST '09 Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust
Consistency-based characterization for IC Trojan detection
Proceedings of the 2009 International Conference on Computer-Aided Design
Anonymizer-Enabled Security and Privacy for RFID
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A Survey of Hardware Trojan Taxonomy and Detection
IEEE Design & Test
Gate-level characterization: foundations and hardware security applications
Proceedings of the 47th Design Automation Conference
Synthesis of trustable ICs using untrusted CAD tools
Proceedings of the 47th Design Automation Conference
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
Matched public PUF: ultra low energy security platform
Proceedings of the 17th IEEE/ACM international symposium on Low-power electronics and design
Integrated circuit security techniques using variable supply voltage
Proceedings of the 48th Design Automation Conference
Device aging-based physically unclonable functions
Proceedings of the 48th Design Automation Conference
An asymmetric security mechanism for navigation signals
IH'04 Proceedings of the 6th international conference on Information Hiding
Scalable segmentation-based malicious circuitry detection and diagnosis
Proceedings of the International Conference on Computer-Aided Design
A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection
IEEE Transactions on Information Forensics and Security
Malicious Circuitry Detection Using Thermal Conditioning
IEEE Transactions on Information Forensics and Security - Part 2
Energy attacks and defense techniques for wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Hi-index | 0.00 |
This paper addresses the hardware Trojan (HT) attacks that impose severe threats to the security and integrity of wireless networks and systems. We first develop HT attack models by embedding a single HT gate in the target design that triggers advanced malicious attacks. We place the one-gate HT trigger in such a way that it exhibits rare switching activities, consumes ultra-low leakage power, and hides from delay characterizations. Therefore, the HT attack models are capable of bypassing the widely used side channel-based HT detection schemes. Furthermore, based on the HT attack models, we investigate the potential on-line threat models during the system operation and develop an in-field trusted HT detection approach using physical unclonable functions (PUFs). We evaluate the effectiveness of the HT attack and defense models on a set of ISCAS'85, ISCAS'89, and ITC'99 benchmarks.