Feb. 20, 2023, 2:17 a.m. | Aruna Jayasena, Prabhat Mishra

cs.CR updates on arXiv.org arxiv.org

Increasing design complexity and reduced time-to-market have motivated
manufacturers to outsource some parts of the System-on-Chip (SoC) design flow
to third-party vendors. This provides an opportunity for attackers to introduce
hardware Trojans by constructing stealthy triggers consisting of rare events
(e.g., rare signals, states, and transitions). There are promising test
generation-based hardware Trojan detection techniques that rely on the
activation of rare events. In this paper, we investigate rareness reduction as
a design-for-trust solution to make it harder for an …

attackers chip complexity design detection events flow hardware market opportunity party signals soc states system techniques test third third-party third-party vendors transitions trojan trojans trust vendors

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India

Cybersecurity Architect, Infrastructure & Technical Security

@ KCB Group | Kenya