Deton: Defeating Hardware Trojan Horses in Microprocessors Through Software Obfuscation

被引:0
|
作者
Cassano, Luca [1 ]
Iamundo, Mattia [1 ]
Lopez, Tomas Antonio [1 ]
Nazzari, Alessandro [1 ]
Natale, Giorgio Di [2 ]
机构
[1] Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy
[2] Institut Polytechnique de Grenoble, Universite Grenoble Alpes, TIMA, Grenoble, France
来源
SSRN | 2022年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Exposed to - Hardware platform - Hardware Trojan detection - Hardware Trojan horse - High-level goals - Program execution - Secret information - Sensitive informations - Software obfuscation - Target hardware
引用
收藏
相关论文
共 50 条
  • [1] DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN
    Cassano, Luca
    Iamundo, Mattia
    Lopez, Tomas Antonio
    Nazzari, Alessandro
    Di Natale, Giorgio
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129
  • [2] Defeating Hardware Trojan in Microprocessor Cores through Software Obfuscation
    Marcelli, Andrea
    Sanchez, Ernesto
    Squillero, Giovanni
    Jamal, Muhammad Usman
    Imtiaz, Afnan
    Machetti, Simone
    Mangani, Filippo
    Monti, Paolo
    Pola, Davide
    Salvato, Alessandro
    Simili, Michele
    2018 IEEE 19TH LATIN-AMERICAN TEST SYMPOSIUM (LATS), 2018,
  • [3] On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors
    Cassano, Luca
    Lazzeri, Elia
    Litovchenko, Nikita
    Di Natale, Giorgio
    2022 25TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS AND SYSTEMS (DDECS), 2022, : 172 - 177
  • [4] A Lightweight Security Checking Module to Protect Microprocessors against Hardware Trojan Horses
    Palumbo, Alessandro
    Cassano, Luca
    Reviriego, Pedro
    Bianchi, Giuseppe
    Ottavi, Marco
    34TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT 2021), 2021,
  • [5] Hardware Trojan Horses
    Tehranipoor, Mohammad
    Sunar, Berk
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 167 - 187
  • [6] SOFTWARE HARDWARE INTEGRATION ON MICROPROCESSORS
    BOWEN, J
    MICROPROCESSORS AND MICROSYSTEMS, 1985, 9 (01) : 8 - 14
  • [7] Hardware-Assisted Code Obfuscation for FPGA Soft Microprocessors
    Kainth, Meha
    Krishnan, Lekshmi
    Narayana, Chaitra
    Virupaksha, Sandesh Gubbi
    Tessier, Russell
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 127 - 132
  • [8] Facilitating Side Channel Analysis by Obfuscation for Hardware Trojan Detection
    Nejat, Arash
    Hely, David
    Beroulle, Vincent
    2015 10TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2015, : 129 - 134
  • [9] Software versus hardware testing of microprocessors
    Sosnowski, Janusz
    Gawkowski, Piotr
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2009, 55 (01) : 31 - 46
  • [10] Hardware Trojan Horses in Cryptographic IP Cores
    Bhasin, Shivam
    Danger, Jean-Luc
    Guilley, Sylvain
    Xuan Thuy Ngo
    Sauvage, Laurent
    2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 15 - 29