Hardware intellectual property (IP) cores from untrusted vendors are widely used, raising security concerns for system designers. Although formal methods provide powerful solutions for detecting malicious behaviors in hardware, the participation of manual work prevents the methods from reaching practical applications. For example, Information Flow Tracking (IFT) represents a powerful approach to preventing leakage of sensitive information. However, existing IFT solutions either introduce hardware overheads or lack practical automatic working procedures, especially for hardware sequential logic. To alleviate these challenges, we propose a framework that fully automates information leakage detection at the gate level of hardware. This framewo...
2015-02-18High cost differentials are causing many aspects of integrated circuit (IC) design—includi...
As a result of the globalisation of the semiconductor design and fabrication processes, integrated c...
Secure hardware design is a challenging task that goes far beyond ensuring functional correctness. I...
A method based on information-flow tracking uses gate-level logic to detect hardware Trojans that vi...
The increasing number of hardware-based security attacks along with prevalence of embedded systems ...
Globalization of micro-chip fabrication has opened a new avenue of cyber-crime. It is now possible t...
Computers are being placed in charge of the systems and devices we trust with our safety and securit...
To ensure that a hardware Trojan remains hidden in a circuit, it is usually necessary to ensure that...
Today multi-million gate integrated circuits are being commonly used in many critical (eg., health c...
Part II of this paper series focuses on automation of the extended proof-carrying hardware intellect...
International audienceIn this paper we study the information leakage that may exist, due to electric...
Embedded systems are found in many safety- and security-critical applications, and bring aspects of ...
Cryptology ePrint Archive: Report 2015/912In this paper we present a novel solution to address the p...
Advanced, superscalar microprocessors (μP) are highly susceptible to wear-out failures because of th...
International audienceHardware Trojan (HT), Integrated Circuit (IC) piracy, and overproduction are t...
2015-02-18High cost differentials are causing many aspects of integrated circuit (IC) design—includi...
As a result of the globalisation of the semiconductor design and fabrication processes, integrated c...
Secure hardware design is a challenging task that goes far beyond ensuring functional correctness. I...
A method based on information-flow tracking uses gate-level logic to detect hardware Trojans that vi...
The increasing number of hardware-based security attacks along with prevalence of embedded systems ...
Globalization of micro-chip fabrication has opened a new avenue of cyber-crime. It is now possible t...
Computers are being placed in charge of the systems and devices we trust with our safety and securit...
To ensure that a hardware Trojan remains hidden in a circuit, it is usually necessary to ensure that...
Today multi-million gate integrated circuits are being commonly used in many critical (eg., health c...
Part II of this paper series focuses on automation of the extended proof-carrying hardware intellect...
International audienceIn this paper we study the information leakage that may exist, due to electric...
Embedded systems are found in many safety- and security-critical applications, and bring aspects of ...
Cryptology ePrint Archive: Report 2015/912In this paper we present a novel solution to address the p...
Advanced, superscalar microprocessors (μP) are highly susceptible to wear-out failures because of th...
International audienceHardware Trojan (HT), Integrated Circuit (IC) piracy, and overproduction are t...
2015-02-18High cost differentials are causing many aspects of integrated circuit (IC) design—includi...
As a result of the globalisation of the semiconductor design and fabrication processes, integrated c...
Secure hardware design is a challenging task that goes far beyond ensuring functional correctness. I...