Remote Activation of Hardware Trojans via a Covert Temperature Channel
book
January 2015
Hardware IP Security and Trust
book
January 2017
Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip
book
January 2017
The Hardware Trojan War
book
January 2018
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
book
January 2011
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability
conference
January 2015
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
journal
October 2011
Hardware Trojan Detection Based on Logical Testing
journal
June 2017
Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing
journal
July 2018
An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size
journal
December 2019
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier
journal
August 2021
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection
journal
March 2024
Benchmarking of Hardware Trojans and Maliciously Affected Circuits
journal
March 2017
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods
journal
February 2018
Targeted modification of hardware trojans
journal
March 2019
EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration
journal
December 2023
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection
journal
September 2018
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
journal
June 2021
Ten years of hardware Trojans: a survey from the attacker's perspective
journal
September 2020
Coverage metrics for functional validation of hardware designs
journal
January 2001
Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method
journal
January 2019
A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges
journal
January 2020
An Unsupervised Detection Approach for Hardware Trojans
journal
January 2020
A Survey on Split Manufacturing: Attacks, Defenses, and Challenges
journal
January 2020
Netlist reverse engineering for high-level functionality reconstruction
conference
January 2016
Trojan localization using symbolic algebra
conference
January 2017
Detecting hardware Trojans in unspecified functionality through solving satisfiability problems
conference
January 2017
ASAX: Automatic security assertion extraction for detecting Hardware Trojans
conference
January 2018
HLIFT: A high-level information flow tracking method for detecting hardware Trojans
conference
January 2018
System-on-chip security architecture and CAD framework for hardware patch
conference
January 2018
Detecting RTL Trojans using Artificial Immune Systems and High Level Behavior Classification
conference
December 2018
Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks
conference
December 2019
A Formal Framework for Gate- Level Information Leakage Using Z3
conference
December 2020
Hardware Trojans Detection Through RTL Features Extraction and Machine Learning
conference
December 2021
EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security
conference
December 2022
A Machine Learning Based Automatic Hardware Trojan Attack Space Exploration and Benchmarking Framework
conference
December 2022
Analysis of Hardware Trojan Resilience Enabled through Logic Locking
conference
December 2022
RELIC-FUN: Logic Identification through Functional Signal Comparisons
conference
July 2020
GDSII-Guard: ECO Anti-Trojan Optimization with Exploratory Timing-Security Trade-Offs
conference
July 2023
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
conference
March 2008
A Benchmark Suite of RT-level Hardware Trojans for Pipelined Microprocessor Cores
conference
April 2021
Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level
conference
October 2013
EnSAFe: Enabling Sustainable SoC Security Auditing using eFPGA-based Accelerators
conference
October 2023
Hardware Trojan Prevention Through Limiting Access to the Active Region
Supon, Tareq Muhammad; Seyedbarhagh, Mahsasadat; Rashidzadeh, Rashid
2019 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)
https://doi.org/10.1109/DTIS.2019.8735085
conference
April 2019
Exploiting sub-graph isomorphism and probabilistic neural networks for the detection of hardware Trojans at RTL
conference
October 2017
Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores
conference
December 2021
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
conference
September 2019
New design strategy for improving hardware Trojan detection and reducing Trojan activation time
conference
January 2009
ODETTE: A non-scan design-for-test methodology for Trojan detection in ICs
conference
June 2011
On hardware Trojan design and implementation at register-transfer level
conference
June 2013
Malicious circuitry detection using fast timing characterization via test points
conference
June 2013
A security-aware design scheme for better hardware Trojan detection sensitivity
conference
May 2015
Toward automatic proof generation for information flow policies in third-party hardware IP
conference
May 2015
R2D2: Runtime reassurance and detection of A2 Trojan
conference
April 2018
FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection
conference
May 2019
A Novel Hardware Trojan Protection Technology Based on Logic Encryption
conference
November 2018
A proof-carrying based framework for trusted microprocessor IP
conference
November 2013
Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans
conference
November 2017
Stealth assessment of hardware Trojans in a microcontroller
conference
September 2012
TAINT: Tool for Automated INsertion of Trojans
conference
November 2017
DFTT: Design for Trojan Test
conference
December 2010
A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans
conference
July 2014
Hardware Trojans classification for gate-level netlists based on machine learning
conference
July 2016
Hardware Trojans classification for gate-level netlists using multi-layer neural networks
conference
July 2017
HATE: a HArdware Trojan Emulation Environment for Microprocessor-based Systems
conference
July 2019
Applied formal methods for hardware Trojan detection
conference
June 2014
VeriCoq: A Verilog-to-Coq converter for proof-carrying hardware automation
conference
May 2015
Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier
conference
May 2017
Hardware Trojan Design on Neural Networks
conference
May 2019
TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection
conference
May 2023
Semi-supervised Trojan Nets Classification Using Anomaly Detection Based on SCOAP Features
conference
May 2022
Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO
conference
May 2021
A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware
conference
May 2021
MAAS: Hiding Trojans in Approximate Circuits
conference
April 2023
Detection and analysis of hardware trojan using scan chain method
conference
June 2015
Hardware Trust through Layout Filling: A Hardware Trojan Prevention Technique
conference
July 2016
Layout Vulnerability Reduction against Trojan Insertion Using Security-Aware White Space Distribution
conference
July 2017
An Improved Automatic Hardware Trojan Generation Platform
conference
July 2019
A Secure Design Methodology to Prevent Targeted Trojan Insertion during Fabrication
conference
June 2023
Benchmarking of SoC-Level Hardware Vulnerabilities: A Complete Walkthrough
conference
June 2023
SymbA: Symbolic Execution at C-level for Hardware Trojan Activation
conference
October 2021
Property Based Formal Security Verification for Hardware Trojan Detection
conference
July 2018
Hardware Trojan Detection and Functionality Determination for Soft IPs
conference
July 2018
Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain
journal
August 2014
Hardware Trojan Attacks: Threat Analysis and Countermeasures
journal
August 2014
Defeating hardware Trojan in microprocessor cores through software obfuscation
conference
March 2018
Hardware Trojan Threats to Cache Coherence in Modern 2.5D Chiplet Systems
journal
July 2022
FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic
journal
June 2015
Detecting Hardware Trojans with Gate-Level Information-Flow Tracking
journal
August 2016
Protection Against Hardware Trojans With Logic Testing: Proposed Solutions and Challenges Ahead
journal
April 2018
TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning
conference
September 2024
The Hunt For The Kill Switch
journal
May 2008
Advancing the state-of-the-art in hardware Trojans design
conference
August 2017
Robust bitstream protection in FPGA-based systems through low-overhead obfuscation
conference
November 2016
Identifying Specious LUTs for Satisfiability Don’t Care Trojan Detection
conference
September 2021
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
conference
May 2010
Defeating UCI: Building Stealthy and Malicious Hardware
conference
May 2011
A2: Analog Malicious Hardware
conference
May 2016
ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans
conference
May 2020
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time
conference
May 2021
An Implicit Enumeration Algorithm to Generate Tests for Combinational Logic Circuits
journal
March 1981
Scalable Concolic Testing of RTL Models
journal
July 2021
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
journal
February 2023
A Framework for Automated Exploration of Trojan Attack Space in FPGA Netlists
journal
October 2023
Node-Wise Hardware Trojan Detection Based on Graph Learning
journal
March 2025
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
journal
October 2009
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans
journal
December 2014
Cost-efficient Acceleration of Hardware Trojan Detection Through Fan-Out Cone Analysis and Weighted Random Pattern Technique
journal
May 2016
TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits
journal
April 2016
TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling With Optimal Loop Unrolling Factor During High Level Synthesis
journal
April 2017
Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality
journal
September 2017
Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis
journal
July 2018
A Practical Split Manufacturing Framework for Trojan Prevention via Simultaneous Wire Lifting and Cell Insertion
journal
September 2019
PMTP: A MAX-SAT-Based Approach to Detect Hardware Trojan Using Propagation of Maximum Transition Probability
journal
January 2020
Hybrid Evolutionary Design Space Exploration Algorithm With Defence Against Third Party IP Vulnerabilities
journal
October 2020
Scalable Activation of Rare Triggers in Hardware Trojans by Repeated Maximal Clique Sampling
journal
July 2021
ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits
journal
April 2022
A Novel Algorithm for Hardware Trojan Detection Through Reverse Engineering
journal
April 2022
GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists
journal
August 2022
Hardware-Supported Patching of Security Bugs in Hardware IP Blocks
journal
January 2023
An Automated Framework for Board-Level Trojan Benchmarking
journal
February 2023
Circuit Topology-Aware Vaccination-Based Hardware Trojan Detection
journal
September 2023
GNN4HT: A Two-Stage GNN-Based Approach for Hardware Trojan Multifunctional Classification
journal
January 2025
Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme
journal
June 2022
Advancing the State-of-the-Art in Hardware Trojans Detection
journal
January 2019
HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
journal
May 2019
Hardware Trojans hidden in RTL don't cares — Automated insertion and prevention methodologies
conference
October 2015
FASTrust: Feature analysis for third-party IP trust verification
conference
October 2015
Hardware trojan detection through information flow security verification
conference
October 2017
Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify
conference
October 2018
Scalable Hardware Trojan Activation by Interleaving Concrete Simulation and Symbolic Execution
conference
October 2018
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation
journal
March 2014
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
journal
March 2014
Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking Techniques
journal
October 2017
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects
journal
October 2021
Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection
journal
February 2012
Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion
journal
June 2016
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist
journal
February 2017
Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection
journal
January 2020
Design and Validation for FPGA Trust under Hardware Trojan Attacks
journal
July 2016
Black-Hat High-Level Synthesis: Myth or Reality?
journal
April 2019
HarTBleed: Using Hardware Trojans for Data Leakage Exploits
journal
April 2020
Cache-Out: Leaking Cache Memory Using Hardware Trojan
journal
June 2020
AdaTrust : Combinational Hardware Trojan Detection Through Adaptive Test Pattern Construction
journal
March 2021
SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking
journal
August 2021
Golden Reference-Free Hardware Trojan Localization Using Graph Convolutional Network
journal
October 2022
Trojan Resilient Computing in COTS Processors Under Zero Trust
journal
October 2022
TVF: A Metric for Quantifying Vulnerability Against Hardware Trojan Attacks
journal
July 2023
Novel Design of Hardware Trojan: A Generic Approach for Defeating Testability Based Detection
conference
December 2020
Efficient Trace Signal Selection for Post Silicon Validation and Debug
conference
January 2011
Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage
Rajendran, Jeyavijayan; Dhandayuthapany, Arunshankar Muruga; Vedula, Vivekananda
2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID)
https://doi.org/10.1109/VLSID.2016.143
conference
January 2016
Hardware Trojan Detection Using ATPG and Model Checking
Cruz, Jonathan; Farahmandi, Farimah; Ahmed, Alif
2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)
https://doi.org/10.1109/VLSID.2018.43
conference
January 2018
Proof carrying-based information flow tracking for data secrecy protection and hardware trust
conference
April 2012
Modeling and test generation for combinational hardware Trojans
conference
April 2018
Taming Combinational Trojan Detection Challenges with Self-Referencing Adaptive Test Patterns
conference
April 2020
HW2VEC: a Graph Learning Tool for Automating Hardware Security
conference
December 2021
Complete information flow tracking from the gates up
Tiwari, Mohit; Wassel, Hassan M. G.; Mazloom, Bita
Proceedings of the 14th international conference on Architectural support for programming languages and operating systems
https://doi.org/10.1145/1508244.1508258
conference
March 2009
Security against hardware Trojan through a novel application of design obfuscation
conference
November 2009
VeriTrust
conference
May 2013
FANCI: identification of stealthy malicious logic using boolean functional analysis
conference
January 2013
Advanced Techniques for Designing Stealthy Hardware Trojans
conference
June 2014
FIGHT-Metric
conference
June 2014
DeTrust
conference
November 2014
Untrusted Third Party Digital IP Cores
conference
May 2015
Detecting malicious modifications of data in third-party intellectual property cores
conference
June 2015
Pre-silicon security verification and validation
conference
June 2015
A Hardware Design Language for Timing-Sensitive Information-Flow Security
journal
March 2015
Avfsm
conference
June 2016
Information dispersion for trojan defense through high-level synthesis
conference
June 2016
Malicious LUT
conference
November 2016
Mers
conference
October 2016
OPTICS: ordering points to identify the clustering structure
journal
June 1999
Toggle MUX
conference
June 2017
Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models
Piccolboni, Luca; Menon, Alessandro; Pravadelli, Graziano
ACM Transactions on Embedded Computing Systems, Vol. 16, Issue 5s
https://doi.org/10.1145/3126552
journal
September 2017
Swan
conference
November 2018
Security
conference
November 2018
CAD-Base
Basu, Kanad; Saeed, Samah Mohamed; Pilato, Christian
ACM Transactions on Design Automation of Electronic Systems, Vol. 24, Issue 4
https://doi.org/10.1145/3315574
journal
April 2019
How Secure Is Split Manufacturing in Preventing Hardware Trojan?
journal
March 2020
Soft-HaT
journal
June 2020
The Big Hack Explained: Detection and Prevention of PCB Supply Chain Implants
journal
October 2020
Hardware Trojan Attack in Embedded Memory
journal
January 2021
Taal
journal
March 2021
Hardware Information Flow Tracking
journal
May 2021
Deterrent
conference
July 2022
Hardware Trojan Insertion Using Reinforcement Learning
conference
June 2022
The Improved COTD Technique for Hardware Trojan Detection in Gate-level Netlist
conference
June 2022
AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
journal
January 2023
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
conference
November 2022
A Symbolic Approach to Detecting Hardware Trojans Triggered by Don’t Care Transitions
journal
December 2022
Security Closure of IC Layouts Against Hardware Trojans
conference
March 2023
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing
Gaikwad, Pravin; Cruz, Jonathan; Chakraborty, Prabuddha
ACM Journal on Emerging Technologies in Computing Systems, Vol. 19, Issue 3
https://doi.org/10.1145/3592795
journal
June 2023
Scoap
conference
January 1980
Register transfer level information flow tracking for provably secure hardware design
conference
March 2017
An automated configurable Trojan insertion framework for dynamic trust benchmarks
conference
March 2018
TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint
conference
March 2019
Test Pattern Superposition to Detect Hardware Trojans
conference
March 2020
Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis
conference
March 2020
GNN4TJ: Graph Neural Networks for Hardware Trojan Detection at Register Transfer Level
conference
February 2021
MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction
conference
March 2022
Inter-IP Malicious Modification Detection through Static Information Flow Tracking
conference
March 2022
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
journal
August 2020