Deton: Defeating Hardware Trojan Horses in Microprocessors Through Software Obfuscation

被引:0
|
作者
Cassano, Luca [1 ]
Iamundo, Mattia [1 ]
Lopez, Tomas Antonio [1 ]
Nazzari, Alessandro [1 ]
Natale, Giorgio Di [2 ]
机构
[1] Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy
[2] Institut Polytechnique de Grenoble, Universite Grenoble Alpes, TIMA, Grenoble, France
来源
SSRN | 2022年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Exposed to - Hardware platform - Hardware Trojan detection - Hardware Trojan horse - High-level goals - Program execution - Secret information - Sensitive informations - Software obfuscation - Target hardware
引用
收藏
相关论文
共 50 条
  • [31] Hardware IP Protection Through Gate-level Obfuscation
    Li, Dongfang
    Liu, Wenchao
    Zou, Xuecheng
    Liu, Zhenglin
    2015 14TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN AND COMPUTER GRAPHICS (CAD/GRAPHICS), 2015, : 186 - 193
  • [32] Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units
    Sharma, Ankur A.
    Zhang, Xinmiao
    Lao, Yingjie
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [33] Hardware Obfuscation of AES through Finite Field Construction Variation
    Zhang, Xinmiao
    Shvartsman, Phillip
    Zhou, Jingbo
    Tawfik, Eslam
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [34] Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU
    Karimi, Elmira
    Fei, Yunsi
    Kaeli, David
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 122 - 131
  • [35] Supporting FPGA microprocessors through retargetable software tools
    Clark, DA
    Hutchings, BL
    IEEE SYMPOSIUM ON FPGAS FOR CUSTOM COMPUTING MACHINES, PROCEEDINGS, 1996, : 195 - 203
  • [37] A Novel Algorithm for Hardware Trojan Detection Through Reverse Engineering
    Rajendran, Sreeja
    Regeena, Mary Lourde
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) : 1154 - 1166
  • [38] Hardware Trojan Detection through Information Flow Security Verification
    Nahiyan, Adib
    Sadi, Mehdi
    Vittal, Rahul
    Contreras, Gustavo
    Forte, Domenic
    Tehranipoor, Mark
    2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [39] Analysis of Hardware Trojan Resilience Enabled through Logic Locking
    Cruz, Jonathan
    Gaikwad, Pravin
    Bhunia, Swarup
    2022 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2022,
  • [40] Hardware Trojan Prevention Through Limiting Access to the Active Region
    Supon, Tareq Muhammad
    Seyedbarhagh, Mahsasadat
    Rashidzadeh, Rashid
    Muscedere, Roberto
    2019 14TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2019), 2019,