Deton: Defeating Hardware Trojan Horses in Microprocessors Through Software Obfuscation

被引:0
|
作者
Cassano, Luca [1 ]
Iamundo, Mattia [1 ]
Lopez, Tomas Antonio [1 ]
Nazzari, Alessandro [1 ]
Natale, Giorgio Di [2 ]
机构
[1] Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy
[2] Institut Polytechnique de Grenoble, Universite Grenoble Alpes, TIMA, Grenoble, France
来源
SSRN | 2022年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Exposed to - Hardware platform - Hardware Trojan detection - Hardware Trojan horse - High-level goals - Program execution - Secret information - Sensitive informations - Software obfuscation - Target hardware
引用
收藏
相关论文
共 50 条
  • [11] A Novel Approach to Detecting Hardware Trojan Horses
    Zhang, Jia-lin
    Fang, Lei
    Li, Lei
    Zhang, Zi-xuan
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 43 - 46
  • [12] AES-SEC: Improving software obfuscation through hardware-assistance
    Schrittwieser, Sebastian
    Katzenbeisser, Stefan
    Merzdovnik, Georg
    Kieseberg, Peter
    Weippl, Edgar
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 184 - 191
  • [13] Novel design of Hardware Trojan: A generic approach for defeating testability based detection
    Zhang, Ning
    Lv, Zhiqiang
    Zhang, Yanlin
    Li, Haiyang
    Zhang, Yixin
    Huang, Weiqing
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 162 - 173
  • [14] Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
    Thejaswini, P.
    Vivekananda, G.
    Anu, H.
    Priya, R.
    Prasad, B. S. Krishna
    Nischay, M.
    EMITTER-INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGY, 2022, 10 (02) : 370 - 388
  • [15] A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
    Martin, H.
    Entrena, L.
    Dupuis, S.
    Di Natale, G.
    2018 IEEE 24TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2018), 2018, : 41 - 42
  • [16] On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis
    Karimi, Naghmeh
    Danger, Jean-Luc
    Guilley, Sylvain
    2018 IEEE 24TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2018), 2018, : 281 - 286
  • [18] Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
    Chakraborty, Abhishek
    Srivastava, Ankur
    2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 549 - 554
  • [19] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785
  • [20] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Rajat Subhra Chakraborty
    Swarup Bhunia
    Journal of Electronic Testing, 2011, 27 : 767 - 785