Deton: Defeating Hardware Trojan Horses in Microprocessors Through Software Obfuscation

被引:0
|
作者
Cassano, Luca [1 ]
Iamundo, Mattia [1 ]
Lopez, Tomas Antonio [1 ]
Nazzari, Alessandro [1 ]
Natale, Giorgio Di [2 ]
机构
[1] Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy
[2] Institut Polytechnique de Grenoble, Universite Grenoble Alpes, TIMA, Grenoble, France
来源
SSRN | 2022年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Exposed to - Hardware platform - Hardware Trojan detection - Hardware Trojan horse - High-level goals - Program execution - Secret information - Sensitive informations - Software obfuscation - Target hardware
引用
收藏
相关论文
共 50 条
  • [21] Special Section on Hardware and Software Technologies on Advanced Microprocessors FOREWORD
    Uchiyama, Kunio
    IEICE TRANSACTIONS ON ELECTRONICS, 2009, E92C (10) : 1231 - 1231
  • [22] MICROPROCESSORS IN CRT TERMINAL APPLICATIONS - HARDWARE-SOFTWARE TRADEOFFS
    GRAY, MT
    COMPUTER, 1975, 8 (10) : 53 - 59
  • [23] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications
    Chhabra, Surbhi
    Lata, Kusum
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
  • [24] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications
    Chhabra, Surbhi
    Lata, Kusum
    Concurrency and Computation: Practice and Experience, 2022, 34 (21):
  • [25] Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique
    Ba, Papa-Sidy
    Dupuis, Sophie
    Palanichamy, Manikandan
    Marie-Lise-Flottes
    Di Natale, Giorgio
    Rouzeyre, Bruno
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 254 - 259
  • [26] BIT-SLICE MICROPROCESSORS - A HARDWARE AND SOFTWARE-DEVELOPMENT KIT
    LONGAIR, IM
    MORGAN, AD
    INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION, 1987, 24 (04) : 325 - 336
  • [27] Hardware Trojan Detection Through Temperature Characteristics Analysis
    Zhong Jingxin
    Wang Jianye
    Kan Baoqiang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 743 - 749
  • [28] MICROCOMPUTERS MICROPROCESSORS - HARDWARE, SOFTWARE, AND APPLICATIONS - HILBURN,JL, JULICH,PM
    SLOAN, ME
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1978, 8 (11): : 834 - 834
  • [29] Evasive Hardware Trojan through Adversarial Power Trace
    Omidi, Behnam
    Khasawneh, Khaled N.
    Alouani, Ihsen
    arXiv, 1600,
  • [30] Separating trojan horses, viruses, and worms - A proposed taxonomy of software weapons
    Karresand, M
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 127 - 134