Hardware Trojan

A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. A hardware Trojan is completely characterized by its… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2007-2017
05020072017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Hardware Trojan horses (HTHs) are the malicious altering of hardware specification or implementation in such a way that its… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In order to ensure trusted in–field operation of integrated circuits, it is important to develop efficient low–cost techniques to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Review
2009
Review
2009
Malicious modification of hardware during design or fabrication has emerged as a major security concern. Such tampering (also… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Hardware Trojans in integrated circuits and systems have become serious concern to fabless semiconductor industry and government… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
We introduce the first approach for pre-synthesis embedding of hardware Trojan horses (HTHs) by the designer. The embedded HTH… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?