Skip Nav Destination
Close Modal
Search Results for
malicious hardware attack
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
NARROW
Format
Topics
Journal
Article Type
Date
Availability
1-6 of 6 Search Results for
malicious hardware attack
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
EDFA Technical Articles (2019) 21 (3): 16–24.
Published: 01 August 2019
... serve as trust verification tools and provides practical guidelines for making hardware more secure. This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats...
Abstract
View article
PDF
This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats created. It also explains how physical inspection methods can serve as trust verification tools and provides practical guidelines for making hardware more secure.
Journal Articles
EDFA Technical Articles (2019) 21 (2): 30–36.
Published: 01 May 2019
... be employed to provide trust and assurance when dealing with commercial off-the-shelf chips. Copyright © ASM International® 2019 2019 ASM International counterfeit ICs image analysis machine learning malicious hardware attack reverse engineering trust and assurance 3 0 httpsdoi.org/10.31399...
Abstract
View article
PDF
Integrated circuits embedded in everyday devices face an increased risk of tampering and intrusion. In this article, the authors explain how reverse engineering techniques, including automated image analysis, can be employed to provide trust and assurance when dealing with commercial off-the-shelf chips.
Journal Articles
EDFA Technical Articles (2022) 24 (2): 24–32.
Published: 01 May 2022
... for malicious attacks. In this article, the authors assess the vulnerabilities inherent in the fabrication of interposers and describe various types of optical attacks along with practical countermeasures. Interposers play an important role in 2.5D and 3D packages, routing power and communication signals...
Abstract
View article
PDF
Interposers play an important role in 2.5D and 3D packages, routing power and communication signals between dies while maintaining electrical contact with I/O pins. This role and their relatively simple construction makes interposers a target for malicious attacks. In this article, the authors assess the vulnerabilities inherent in the fabrication of interposers and describe various types of optical attacks along with practical countermeasures.
Journal Articles
EDFA Technical Articles (2021) 23 (3): 13–22.
Published: 01 August 2021
... attack EDFAAO (2021) 3:13-22 httpsdoi.org/10.31399/asm.edfa.2021-3.p013 1537-0755/$19.00 ©ASM International® 13 ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 23 NO. 3 THE THREAT OF MALICIOUS CIRCUIT-BOARD ALTERATION: ATTACK TAXONOMY AND EXAMPLES Samuel H. Russ University of South Alabama, Mobile sruss...
Abstract
View article
PDF
Circuit boards are vulnerable to a wide range of ill-intentioned modifications done to gain access to information or malevolently influence control. This article describes the various ways attacks on circuit board can occur and presents examples showing how such attacks might look. It also provides general guidelines for protecting circuit-board design integrity.
Journal Articles
EDFA Technical Articles (2022) 24 (3): 12–22.
Published: 01 August 2022
..., such as layouts and test vectors.[1] Recently, image processing-based physical inspection techniques have drawn much attention because of the advancement in the microscopy field as a means to detect malicious circuitry (such as logic cells) insertion, deletion, or modification which are known as hardware Trojans...
Abstract
View article
PDF
This article proposes a design for a real-time Trojan detection system and explores possible solutions to the challenge of large-scale SEM image acquisition. One such solution, a deep-learning approach that generates synthetic micrographs from layout images, shows significant promise. Learning-based approaches are also used to both synthesize and classify cells. The classification outcome is matched with the design exchange format file entry to ensure the purity of the underlying IC.
Journal Articles
EDFA Technical Articles (2022) 24 (4): 22–29.
Published: 01 November 2022
... a detailed and methodical discussion about how existing and emerging memory devices can fall prey to attacks through various physical modalities. These physical attacks[2] are a well-defined class of hardware attacks, constituting both reverse engineering and fault injection threats. With the increase...
Abstract
View article
PDF
This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks associated with different modalities of attack. It also presents an in-depth security analysis of emerging NVM technologies and discusses potential countermeasures.