In the early stages of information technology (IT), computer crimes were related to dishonest individuals. Until 1980s these crime were developed into physical attacks but criminals were using the authorized access to subvert the security of systems. After 1980s, the development in manufacturing of semiconductor devices resulted in the trend of outsourcing of various design stages of integrated circuits to companies located all across the globe. Outsourced embedded modules have raised the concern on the integrity of the manufacturing process. Since the threat of anyone with access to these outsourced modules can alter and use it accordingly has increased significantly. Therefore, recently researchers are investigating on the possibilities of maliciously inserted hardware in integrated circuits, known as hardware Trojans (HT). These compromised hardware may experience disabled or destructed blocks, leaking of confidential information, denial of service, degradation of performance and other like phenomena.
- Run-time Hardware Trojan Monitors through modeling Burst Mode Communication
- A Self-learning Framework to Detect the Intruded Integrated Circuits
- Analyzing Vulnerability of Asynchronous Pipeline to Soft Errors: Leveraging Formal Verification
- Hardware Trojan detection in SE Tolerant Macro Synchronous Micro Asynchronous (MSMA) pipeline