The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1080/02564602.2016.1246385
|View full text |Cite
|
Sign up to set email alerts
|

A Review on HT Attacks in PLD and ASIC Designs with Potential Defence Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 54 publications
0
8
0
Order By: Relevance
“…Several excellent surveys have been devoted to designs, categorizations, and protections for HT problems [1], [4], [7], [8], [13]- [17], [21], [35]- [39]. For example, Sumathi et al provided a comprehensive review of complex HT threats and illustrated feasible countermeasures against HT attacks for PLD and ASIC life cycles [1]. Zhang et al highlighted the potential security and trust threats associated with FPGA-based systems from a market perspective and discussed the relevant solutions available for each party [15].…”
Section: B Motivation and Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Several excellent surveys have been devoted to designs, categorizations, and protections for HT problems [1], [4], [7], [8], [13]- [17], [21], [35]- [39]. For example, Sumathi et al provided a comprehensive review of complex HT threats and illustrated feasible countermeasures against HT attacks for PLD and ASIC life cycles [1]. Zhang et al highlighted the potential security and trust threats associated with FPGA-based systems from a market perspective and discussed the relevant solutions available for each party [15].…”
Section: B Motivation and Contributionsmentioning
confidence: 99%
“…The tremendous advancements in semiconductor technology have resulted in a large number of participants coordinating during the design and manufacturing process of integrated circuits (ICs) [1], [2]. Particularly given the continuously increasing complexity of ICs, increasingly greater numbers of specialized teams and/or companies, typically dispersed geographically, are involved in this complex process to increase efficiency and manufacturability.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, like software, the hardware still can not be trusted. The risks of the chips should At present, the hidden risk of the integrated circuit mainly comes from the malicious circuits implanted inside which are called Hardware Trojan (HT in short) [3]. In recent years, there are some reports like the following, the defense science council reported in March 2017 that U.S. military weapons systems might have been injected with HTs [4].…”
Section: Introductionmentioning
confidence: 99%
“…Obviously, this offshore foundries technology brings high-security risks to the entire electronics manufacturing industry. As the scale of ICs grows rapidly and manufacture mode becomes more flexible, the main security issues of ICs are caused by the implant of the malicious circuits, named Hardware Trojans (HTs) [ 1 ]. The development trend of the ICs results in them extremely vulnerable to attack by HTs [ 2 ].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the detailed discussion of HTs safety on RF IC and AMS circuits is not included in this article. Sumathi et al [ 1 ] studied the attack and defense of HTs on programmable logic devices (PLD) and application specific ICs (ASIC). Nonetheless, the characteristics of HTs have not been classified.…”
Section: Introductionmentioning
confidence: 99%