You are currently on the new version of our website. Access the old version .

58 Results Found

  • Article
  • Open Access
8 Citations
5,627 Views
19 Pages

Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)

  • Musharraf Hussain,
  • Naveed Khan Baloach,
  • Gauhar Ali,
  • Mohammed ElAffendi,
  • Imed Ben Dhaou,
  • Syed Sajid Ullah and
  • Mueen Uddin

8 April 2023

Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to det...

  • Article
  • Open Access
5 Citations
4,106 Views
9 Pages

Hardware Trojan Detection Using Effective Property-Checking Method

  • Dejian Li,
  • Qizhi Zhang,
  • Dongyan Zhao,
  • Lei Li,
  • Jiaji He,
  • Yidong Yuan and
  • Yiqiang Zhao

24 August 2022

Hardware Trojans refer to additional logic maliciously implanted by attackers in integrated circuits (ICs). Because of the potential security threat of hardware Trojans, they have attracted extensive attention to security issues. As a formal verifica...

  • Article
  • Open Access
3 Citations
1,868 Views
25 Pages

31 October 2024

Property-driven hardware verification provides a promising way to uncover design vulnerabilities. However, developing security properties that check for highly concealed security vulnerabilities remains a significant challenge. In this paper, we prop...

  • Data Descriptor
  • Open Access
4 Citations
4,464 Views
15 Pages

Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4

  • Victor Takashi Hayashi and
  • Wilson Vicente Ruggiero

19 June 2024

Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans. RISC-V speci...

  • Article
  • Open Access
8 Citations
3,535 Views
14 Pages

The chip manufacturing of integrated circuits requires the participation of multiple parties, which greatly increases the possibility of hardware Trojan insertion and poses a significant threat to the entire hardware device landing; however, traditio...

  • Article
  • Open Access
897 Views
15 Pages

Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems

  • Mahfuzur Rahman Talukder,
  • Md. Eftekhar Alam,
  • Abu Monsur Mohammah Fahim and
  • Fakir Sharif Hossain

11 November 2025

Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the...

  • Article
  • Open Access
6 Citations
3,823 Views
16 Pages

A Hardware Trojan-Detection Technique Based on Suspicious Circuit Block Partition

  • Jiajie Mao,
  • Xiaowen Jiang,
  • Dehong Liu,
  • Jianjun Chen and
  • Kai Huang

12 December 2022

To ensure that a hardware Trojan remains hidden in a circuit, it is usually necessary to ensure that the trigger signal has a low testability, which has been widely recognized and proven. The most advanced testability-based detection methods are rath...

  • Article
  • Open Access
16 Citations
4,515 Views
29 Pages

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection

  • Chen Dong,
  • Yinan Yao,
  • Yi Xu,
  • Ximeng Liu,
  • Yan Wang,
  • Hao Zhang and
  • Li Xu

11 June 2023

The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has be...

  • Article
  • Open Access
680 Views
35 Pages

Unleashing GHOST: An LLM-Powered Framework for Automated Hardware Trojan Design

  • Md Omar Faruque,
  • Peter Jamieson,
  • Ahmad Patooghy and
  • Abdel-Hameed A. Badawy

2 December 2025

Traditionally, inserting realistic Hardware Trojans (HTs) in complex hardware systems has been a time-consuming manual process, requiring comprehensive knowledge of the design and navigating intricate Hardware Description Language (HDL) codebases. Ma...

  • Article
  • Open Access
13 Citations
3,047 Views
15 Pages

Spin Orbit Torque-Assisted Magnetic Tunnel Junction-Based Hardware Trojan

  • Rajat Kumar,
  • Divyanshu Divyanshu,
  • Danial Khan,
  • Selma Amara and
  • Yehia Massoud

With the advancement of beyond-CMOS devices to keep Moore’s law alive, several emerging devices have found application in a wide range of applications. Spintronic devices offer low power, non-volatility, inherent spatial and temporal randomness...

  • Article
  • Open Access
2 Citations
3,003 Views
17 Pages

17 November 2022

Hardware Trojans (HTs) pose a security threat to the Internet of Things (IoT). Attackers can take control of devices in IoT through HTs, which seriously jeopardize the security of many systems in transportation, finance, healthcare, etc. Since subtle...

  • Article
  • Open Access
1,426 Views
15 Pages

Gate-Level Hardware Trojan Detection Method Based on K-Hypergraph

  • Jiaji He,
  • Bingxin Lin,
  • Qizhi Zhang and
  • Yiqiang Zhao

To shorten the development cycle of integrated circuit (IC) chips, third-party IP cores (3PIPs) are widely used in the design phase; however, these 3PIPs may be untrusted, creating potential vulnerabilities. Attackers may insert hardware Trojans (HTs...

  • Article
  • Open Access
6 Citations
5,096 Views
19 Pages

Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, ena...

  • Article
  • Open Access
5 Citations
2,249 Views
14 Pages

The globalization of the integrated circuit (IC) industry has raised concerns about hardware Trojans (HT), and there is an urgent need for efficient HT-detection methods of gate-level netlists. Machine learning (ML) is a powerful tool for this purpos...

  • Article
  • Open Access
7 Citations
3,960 Views
19 Pages

19 January 2024

Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely...

  • Article
  • Open Access
9 Citations
3,842 Views
20 Pages

A Hardware Trojan Detection and Diagnosis Method for Gate-Level Netlists Based on Machine Learning and Graph Theory

  • Junjie Wang,
  • Guangxi Zhai,
  • Hongxu Gao,
  • Lihui Xu,
  • Xiang Li,
  • Zeyu Li,
  • Zhao Huang and
  • Changjian Xie

The integrated circuit (IC) supply chain has become globalized, thereby inevitably introducing hardware Trojan (HT) threats during the design stage. To safeguard the integrity and security of ICs, many machine learning (ML)-based solutions have been...

  • Article
  • Open Access
1 Citations
1,873 Views
14 Pages

31 May 2022

The globalization of integrated circuit (IC) design and fabrication has given rise to severe concerns with respect to modeling strategic interaction between malicious attackers and Hardware Trojan (HT) defenders using game theory. The quantitative as...

  • Article
  • Open Access
1,204 Views
18 Pages

GNN-MFF: A Multi-View Graph-Based Model for RTL Hardware Trojan Detection

  • Senjie Zhang,
  • Shan Zhou,
  • Panpan Xue,
  • Lu Kong and
  • Jinbo Wang

23 September 2025

The globalization of hardware design flows has increased the risk of Hardware Trojan (HT) insertion during the design phase. Graph-based learning methods have shown promise for HT detection at the Register Transfer Level (RTL). However, most existing...

  • Article
  • Open Access
1,863 Views
12 Pages

A Hardware Trojan Diagnosis Method for Gate-Level Netlists Based on Graph Theory

  • Hongxu Gao,
  • Guangxi Zhai,
  • Zeyu Li,
  • Jia Zhou,
  • Xiang Li and
  • Quan Wang

With the increasing complexity of integrated circuit design, the threat of a hardware Trojan (HT) is becoming more and more prominent. At present, the research mainly focuses on the detection of HTs, but the amount of research on the diagnosis of HTs...

  • Review
  • Open Access
84 Citations
15,406 Views
19 Pages

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

  • Simranjeet Sidhu,
  • Bassam J. Mohd and
  • Thaier Hayajneh

Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software,...

  • Article
  • Open Access
182 Views
16 Pages

Efficient Reliability-Aware Hardware Trojan Design and Insertion for SET-Induced Soft Error Attacks

  • Alexandra Takou,
  • Georgios-Ioannis Paliaroutis,
  • Pelopidas Tsoumanis,
  • Marko Andjelkovic,
  • Fabian Vargas,
  • Nestor Evmorfopoulos and
  • George Stamoulis

Soft errors and Hardware Trojans (HTs) constitute major reliability concerns, and in combination they can pose an even greater threat to circuit security. The main aim of this research is to develop and implement a reliability-based HT and to identif...

  • Article
  • Open Access
26 Citations
8,959 Views
21 Pages

As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious...

  • Article
  • Open Access
1 Citations
2,855 Views
18 Pages

With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also w...

  • Article
  • Open Access
2 Citations
2,162 Views
14 Pages

29 June 2022

Hardware Trojans (HTs) are malicious hardware components designed to leak confidential information or cause the chip/circuit on which they are integrated to malfunction during operation. When we deploy such hardware platforms for edge computing, FPGA...

  • Review
  • Open Access
50 Citations
18,911 Views
37 Pages

Hardware Trojans in Chips: A Survey for Detection and Prevention

  • Chen Dong,
  • Yi Xu,
  • Ximeng Liu,
  • Fan Zhang,
  • Guorong He and
  • Yuzhong Chen

10 September 2020

Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be...

  • Article
  • Open Access
2,885 Views
15 Pages

Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips

  • Thomas Mountford,
  • Abhijitt Dhavlle,
  • Andrew Tevebaugh,
  • Naseef Mansoor,
  • Sai Manoj Pudukotai Dinakarrao and
  • Amlan Ganguly

In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised. This can be done in a multitude of ways, but the threat of a hardware...

  • Article
  • Open Access
9 Citations
5,207 Views
26 Pages

An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices

  • Amira Hossam Eldin Omar,
  • Hassan Soubra,
  • Donatien Koulla Moulla and
  • Alain Abran

31 October 2024

The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threa...

  • Article
  • Open Access
4 Citations
2,704 Views
29 Pages

23 February 2023

Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also d...

  • Article
  • Open Access
2 Citations
3,539 Views
18 Pages

The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay...

  • Article
  • Open Access
13 Citations
5,153 Views
19 Pages

5 February 2020

Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software,...

  • Article
  • Open Access
1,565 Views
22 Pages

ChipletQuake: On-Die Digital Impedance Sensing for Chiplet and Interposer Verification

  • Saleh Khalaj Monfared,
  • Maryam Saadat Safa and
  • Shahin Tajik

7 August 2025

The increasing complexity and cost of manufacturing monolithic chips have driven the semiconductor industry toward chiplet-based designs, where smaller, modular chiplets are integrated onto a single interposer. While chiplet architectures offer signi...

  • Review
  • Open Access
1,666 Views
35 Pages

A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence

  • Chen Dong,
  • Decheng Qiu,
  • Bolun Li,
  • Yang Yang,
  • Chenxi Lyu,
  • Dong Cheng,
  • Hao Zhang and
  • Zhenyi Chen

7 August 2025

Integrated circuits are the core of a cyber-physical system, where tens of billions of components are integrated into a tiny silicon chip to conduct complex functions. To maximize utilities, the design and manufacturing life cycle of integrated circu...

  • Article
  • Open Access
5 Citations
3,007 Views
21 Pages

13 May 2021

The integrated circuit (IC) manufacturing process involves many players, from chip/board design and fabrication to firmware design and installation. In today’s global supply chain, any of these steps are prone to interference from rogue players, crea...

  • Article
  • Open Access
16 Citations
6,901 Views
17 Pages

A biometric recognition system is one of the leading candidates for the current and the next generation of smart visual systems. The visual system is the engine of the surveillance cameras that have great importance for intelligence and security purp...

  • Feature Paper
  • Article
  • Open Access
16 Citations
4,563 Views
23 Pages

GAINESIS: Generative Artificial Intelligence NEtlists SynthesIS

  • Konstantinos G. Liakos,
  • Georgios K. Georgakilas,
  • Fotis C. Plessas and
  • Paris Kitsos

A significant problem in the field of hardware security consists of hardware trojan (HT) viruses. The insertion of HTs into a circuit can be applied for each phase of the circuit chain of production. HTs degrade the infected circuit, destroy it or le...

  • Article
  • Open Access
1,219 Views
20 Pages

5 July 2025

Stealthy chip-level tamper attacks, such as hardware Trojan insertions or security-critical circuit modifications, can threaten modern microelectronic systems’ security. While traditional inspection and side-channel methods offer potential for...

  • Article
  • Open Access
4 Citations
3,448 Views
18 Pages

14 April 2021

Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at...

  • Article
  • Open Access
2 Citations
7,160 Views
15 Pages

Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary...

  • Article
  • Open Access
3 Citations
2,921 Views
18 Pages

A Circuit-Level Solution for Secure Temperature Sensor

  • Mashrafi Alam Kajol,
  • Mohammad Mezanur Rahman Monjur and
  • Qiaoyan Yu

18 June 2023

Temperature sensors play an important role in modern monitoring and control applications. When more and more sensors are integrated into internet-connected systems, the integrity and security of sensors become a concern and cannot be ignored anymore....

  • Feature Paper
  • Review
  • Open Access
35 Citations
14,559 Views
55 Pages

In this review article for Internet of Things (IoT) applications, important low-power design techniques for digital and mixed-signal analog–digital converter (ADC) circuits are presented. Emerging low voltage logic devices and non-volatile memories (...

  • Article
  • Open Access
11 Citations
7,190 Views
17 Pages

Nowadays, the analog and mixed-signal intellectual property (IP) cores play an important role in system on chip (SoC) design due to their capabilities in performing critical functions. These IPs can be the target of adversaries similar to their digit...

  • Article
  • Open Access
413 Views
21 Pages

Exploring Hardware Vulnerabilities in Robotic Actuators: A Case of Man-in-the-Middle Attacks

  • Raúl Jiménez Naharro,
  • Fernando Gómez-Bravo and
  • Rafael López de Ahumada Gutiérrez

14 December 2025

One of the main vulnerabilities in robotic systems lies in the communication buses that enable low-level controllers to interact with the actuators responsible for the robot’s movements. In this context, hardware attacks represent a significant...

  • Article
  • Open Access
1 Citations
1,906 Views
26 Pages

Leveraging Neural Trojan Side-Channels for Output Exfiltration

  • Vincent Meyers,
  • Michael Hefenbrock,
  • Dennis Gnad and
  • Mehdi Tahoori

Neural networks have become pivotal in advancing applications across various domains, including healthcare, finance, surveillance, and autonomous systems. To achieve low latency and high efficiency, field-programmable gate arrays (FPGAs) are increasi...

  • Article
  • Open Access
1 Citations
3,883 Views
17 Pages

Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation

  • Mehdi Sadi,
  • Bashir Mohammad Sabquat Bahar Talukder,
  • Kaniz Mishty and
  • Md Tauhidur Rahman

19 September 2023

Universal adversarial perturbations are image-agnostic and model-independent noise that, when added to any image, can mislead the trained deep convolutional neural networks into the wrong prediction. Since these universal adversarial perturbations ca...

  • Article
  • Open Access
1 Citations
3,151 Views
14 Pages

A Gate-Level Information Leakage Detection Framework of Sequential Circuit Using Z3

  • Qizhi Zhang,
  • Liang Liu,
  • Yidong Yuan,
  • Zhe Zhang,
  • Jiaji He,
  • Ya Gao,
  • Yao Li,
  • Xiaolong Guo and
  • Yiqiang Zhao

16 December 2022

Hardware intellectual property (IP) cores from untrusted vendors are widely used, raising security concerns for system designers. Although formal methods provide powerful solutions for detecting malicious behaviors in hardware, the participation of m...

  • Article
  • Open Access
21 Citations
7,095 Views
20 Pages

Due to the outsourcing of chip manufacturing, countermeasures against Integrated Circuit (IC) piracy, reverse engineering, IC overbuilding and hardware Trojans (HTs) become a hot research topic. To protect an IC from these attacks, logic encryption t...

  • Article
  • Open Access
11 Citations
3,951 Views
14 Pages

Polymorphic Hybrid CMOS-MTJ Logic Gates for Hardware Security Applications

  • Rajat Kumar,
  • Divyanshu Divyanshu,
  • Danial Khan,
  • Selma Amara and
  • Yehia Massoud

10 February 2023

Various hardware security concerns, such as hardware Trojans and IP piracy, have sparked studies in the security field employing alternatives to CMOS chips. Spintronic devices are among the most-promising alternatives to CMOS devices for applications...

  • Article
  • Open Access
3 Citations
4,665 Views
22 Pages

A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

  • Abhrajit Sengupta,
  • Mohammed Nabeel,
  • Mohammed Ashraf,
  • Johann Knechtel and
  • Ozgur Sinanoglu

Split manufacturing was introduced as a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, the security promise of split manufacturing has been challenged by various att...

  • Article
  • Open Access
94 Views
28 Pages

16 January 2026

The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on. Over the past decade or so,...

of 2