Oct. 26, 2022, 1:24 a.m. | Mayukhmali Das, Sounak Dutta, Sayan Chatterjee

cs.CR updates on arXiv.org arxiv.org

In this paper, we will demonstrate Hardware Trojan Attacks on four different
digital designs implemented on FPGA. The hardware trojan is activated based on
special logical and reduction-based operations on vectors which makes the
trojan-activity as silent and effective as possible. In this paper, we have
introduced 5 novel trojan attack methodologies.

design digital hardware logic trojans

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA