Deton: Defeating Hardware Trojan Horses in Microprocessors Through Software Obfuscation

被引:0
|
作者
Cassano, Luca [1 ]
Iamundo, Mattia [1 ]
Lopez, Tomas Antonio [1 ]
Nazzari, Alessandro [1 ]
Natale, Giorgio Di [2 ]
机构
[1] Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy
[2] Institut Polytechnique de Grenoble, Universite Grenoble Alpes, TIMA, Grenoble, France
来源
SSRN | 2022年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Exposed to - Hardware platform - Hardware Trojan detection - Hardware Trojan horse - High-level goals - Program execution - Secret information - Sensitive informations - Software obfuscation - Target hardware
引用
收藏
相关论文
共 50 条
  • [41] Detecting hardware Trojan through feature extraction in subspace domain
    Hu, A. (aqhu@seu.edu.cn), 1600, Southeast University (44):
  • [42] Hardware Trojan Detection on a PCB Through Differential Power Monitoring
    Piliposyan, Gor
    Khursheed, Saqib
    Rossi, Daniele
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 740 - 751
  • [43] Linear Complementary Dual Code Improvement to Strengthen Encoded Circuit Against Hardware Trojan Horses
    Xuan Thuy Ngo
    Bhasin, Shivam
    Danger, Jean-Luc
    Guilley, Sylvain
    Najm, Zakaria
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 82 - 87
  • [44] Hardware/Software Specialization Through Aspects
    Cardoso, Joao M. P.
    Carvalho, Tiago
    Teixeira, Joao
    Diniz, Pedro C.
    Goncalves, Fernando
    Petrov, Zlatko
    2012 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS (SAMOS): ARCHITECTURES, MODELING AND SIMULATION, 2012, : 260 - 267
  • [45] Key retrieval from AES architecture through hardware trojan horse
    Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Coimbatore, India
    不详
    Commun. Comput. Info. Sci., (483-494): : 483 - 494
  • [46] Compromise through USB-based Hardware Trojan Horse device
    Clark, John
    Leblanc, Sylvain
    Knight, Scott
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2011, 27 (05): : 555 - 563
  • [47] Hardware Trojan Horse Detection through Improved Switching of Dormant Nets
    Dhar, Tapobrata
    Roy, Surajit Kumar
    Giri, Chandan
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (03)
  • [48] Low Overhead System-Level Obfuscation through Hardware Resource Sharing
    Xing, Daniel
    Zuzak, Michael
    Srivastava, Ankur
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 141 - 148
  • [49] Soft-HaT: Software-Based Silicon Reprogramming for Hardware Trojan Implementation
    Alam, Md Mahbub
    Nahiyan, Adib
    Sadi, Mehdi
    Forte, Domenic
    Tehranipoor, Mark
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2020, 25 (04)
  • [50] MICROPROCESSORS AND MICROCOMPUTERS - HARDWARE AND SOFTWARE, 2ND EDITION - TOCCI,RJ, LASKOWSKI,LP
    HARRINGTON, JL
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1983, 34 (02): : 158 - 158