all InfoSec news
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans. (arXiv:2310.03994v1 [cs.AR])
cs.CR updates on arXiv.org arxiv.org
The global semiconductor supply chain involves design and fabrication at
various locations, which leads to multiple security vulnerabilities, e.g.,
Hardware Trojan (HT) insertion. Although most HTs target digital circuits, HTs
can be inserted in analog circuits. Therefore, several techniques have been
developed for HT insertions in analog circuits. Capacitance-based Analog
Hardware Trojan (AHT) is one of the stealthiest HT that can bypass most
existing HT detection techniques because it uses negligible charge accumulation
in the capacitor to generate stealthy triggers. …
design detection digital fabrication global hardware hts mitigation security semiconductor supply supply chain target techniques trojan trojans vulnerabilities