Feb. 3, 2023, 2:10 a.m. | Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik

cs.CR updates on arXiv.org arxiv.org

The threat of hardware Trojans (HTs) and their detection is a widely studied
field. While the effort for inserting a Trojan into an application-specific
integrated circuit (ASIC) can be considered relatively high, especially when
trusting the chip manufacturer, programmable hardware is vulnerable to Trojan
insertion even after the product has been shipped or during usage. At the same
time, detecting dormant HTs with small or zero-overhead triggers and payloads
on these platforms is still a challenging task, as the Trojan …

application asic chip detection hardware high hts integrated circuit laser logic malicious manufacturer product state threat trojan trojans version vulnerable

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Architect - Hardware

@ Intel | IND - Bengaluru

Elastic Consultant

@ Elastic | Spain

OT Cybersecurity Specialist

@ Emerson | Abu Dhabi, United Arab Emirates

Security Operations Program Manager

@ Kaseya | Miami, Florida, United States

Senior Security Operations Engineer

@ Revinate | Vancouver