2021
DOI: 10.1016/j.cose.2021.102223
|View full text |Cite
|
Sign up to set email alerts
|

Towards bidirectional LUT-level detection of hardware Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 10 publications
0
1
0
Order By: Relevance
“…Continuous Intention: To assess the extent to which an individual intends to continue using WhatsApp, the threeitem continuous intention scale developed by Bhattacherjee [87][88][89] was used (e.g., "I intend to continue using WhatsApp").…”
Section: Methodology and Analysismentioning
confidence: 99%
“…Continuous Intention: To assess the extent to which an individual intends to continue using WhatsApp, the threeitem continuous intention scale developed by Bhattacherjee [87][88][89] was used (e.g., "I intend to continue using WhatsApp").…”
Section: Methodology and Analysismentioning
confidence: 99%
“…Cho et al. [ 49 ] proposed a bidirectional mechanism to detect hardware Trojans in FPGAs at any stage in order to efficiently detect them. Similarly, for FPGA research, Ma et al.…”
Section: Related Workmentioning
confidence: 99%
“…Alhelaly et al [48] proposed a method for detecting hardware Trojans in 3D integrated circuits and also explored the performance of this detection method when the attacker modified the characteristics of TSVs. Cho et al [49] proposed a bidirectional mechanism to detect hardware Trojans in FPGAs at any stage in order to efficiently detect them. Similarly, for FPGA research, Ma et al [50] proposed an on-chip security framework that can be used to verify whether an HT has tampered with or corrupted the original design.…”
Section: Detection and Prevention For Specific Chipsmentioning
confidence: 99%
“…The experimental results provided showed that after the database creation, which can take up to 120 hours, the bitstream reverse engineering process takes less than a minute. In 2021, M. Cho et al [55] published yet another methodology that made improvements over the BIL's PIP reverse engineering strategy. Their experiments showed an accuracy of 92.9%, which is similar to techniques presented earlier, such as bit2NCD and BRET.…”
Section: Bitstream Reverse Engineeringmentioning
confidence: 99%