2018
DOI: 10.31399/asm.cp.istfa2018p0256
|View full text |Cite
|
Sign up to set email alerts
|

Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning

Abstract: Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different stages of the design and fabrication processes. Different approaches have been developed to detect Trojans namely non-destructive (electrical tests like run-time monitoring, functional and structural tests) and destructive (full chip reverse engineering). However, these methods cannot detect all types of Trojans and they suffer from a number of disadvantages such as slow speed of detection and lack of confidence in d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
19
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 49 publications
(19 citation statements)
references
References 16 publications
0
19
0
Order By: Relevance
“…A comprehensive overview of Trojans in PCBs is provided in [16]. There is a multitude of literature that immerse into other methods of Trojan detection [17,18]. [18] presents a survey of various older methods of detecting Trojans, whereas [17] presents a variety of newer methods, but with a focus on using SEM images to detect Trojans in ICs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A comprehensive overview of Trojans in PCBs is provided in [16]. There is a multitude of literature that immerse into other methods of Trojan detection [17,18]. [18] presents a survey of various older methods of detecting Trojans, whereas [17] presents a variety of newer methods, but with a focus on using SEM images to detect Trojans in ICs.…”
Section: Related Workmentioning
confidence: 99%
“…There is a multitude of literature that immerse into other methods of Trojan detection [17,18]. [18] presents a survey of various older methods of detecting Trojans, whereas [17] presents a variety of newer methods, but with a focus on using SEM images to detect Trojans in ICs. As mentioned in [4], ICs are the most frequently counterfeit components but also the most important ones.…”
Section: Related Workmentioning
confidence: 99%
“…This work can be extended by considering the difficulties of a real RE process beyond a simulation of the same. Another related work is the contribution from Vashishta et al [10]. In their Trojan Scanner, computer vision algorithms for feature extraction are combined with a supervised machine learning model.…”
Section: Introductionmentioning
confidence: 99%
“…The histogram of oriented gradient (HOG) and support vector machine (SVM) are combined for HT detection [17]. In [18], a "Trojan Scanner" framework is proposed for the untrusted foundry threat model while the trusted golden layout is available. Moreover, deep learning-based techniques attract a lot of attention in the field of IC design and analysis [19][20][21][22].…”
Section: Introductionmentioning
confidence: 99%