May 1, 2023, 12:36 p.m. |

IACR News www.iacr.org

ePrint Report: A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans

Xingyu Meng, Abhrajit Sengupta, Kanad Basu


Distributed integrated circuit (IC) supply chain has resulted in a myriad of security vulnerabilities including that of hardware Trojan (HT). An HT can perform malicious modifications on an IC design with potentially disastrous consequences, such as leaking secret information in cryptographic applications or altering operation instructions in processors. Due to the emergence of outsourced fabrication, an untrusted foundry is considered …

distributed eprint report hardware haystack identify integrated circuit malicious report security supply supply chain trojan trojans vulnerabilities

Azure DevSecOps Cloud Engineer II

@ Prudent Technology | McLean, VA, USA

Security Engineer III - Python, AWS

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India

SOC Analyst (Threat Hunter)

@ NCS | Singapore, Singapore

Managed Services Information Security Manager

@ NTT DATA | Sydney, Australia

Senior Security Engineer (Remote)

@ Mattermost | United Kingdom

Penetration Tester (Part Time & Remote)

@ TestPros | United States - Remote