Cited By
View all- Dupuis SFlottes M(2019)Logic LockingJournal of Electronic Testing: Theory and Applications10.1007/s10836-019-05800-435:3(273-291)Online publication date: 31-Jul-2019
This paper continues the discussion of the risks posed by Hardware Trojan Horse devices by detailing research efforts to build such a Hardware Trojan Horse based on unintended USB channels. Because of the ubiquitousness of the USB protocol in ...
As Multiprocessor System-on-Chips (MPSoCs) continue to scale, security for Network-on-Chips (NoCs) is a growing concern as rogue agents threaten to infringe on the hardwares trust and maliciously implant Hardware Trojans (HTs) to undermine their ...
We have developed an approach for automatic embedding of customizable hardware Trojan horses (HTHs) into an arbitrary finite state machine. The HTH can be used to facilitate a variety of security attacks and does not require any additional gates, ...
European Design and Automation Association
Leuven, Belgium
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in