scholarly journals Hardware Trojans in Chips: A Survey for Detection and Prevention

Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5165
Author(s):  
Chen Dong ◽  
Yi Xu ◽  
Ximeng Liu ◽  
Fan Zhang ◽  
Guorong He ◽  
...  

Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted.

2021 ◽  
Vol 15 (5) ◽  
pp. 1-32
Author(s):  
Quang-huy Duong ◽  
Heri Ramampiaro ◽  
Kjetil Nørvåg ◽  
Thu-lan Dam

Dense subregion (subgraph & subtensor) detection is a well-studied area, with a wide range of applications, and numerous efficient approaches and algorithms have been proposed. Approximation approaches are commonly used for detecting dense subregions due to the complexity of the exact methods. Existing algorithms are generally efficient for dense subtensor and subgraph detection, and can perform well in many applications. However, most of the existing works utilize the state-or-the-art greedy 2-approximation algorithm to capably provide solutions with a loose theoretical density guarantee. The main drawback of most of these algorithms is that they can estimate only one subtensor, or subgraph, at a time, with a low guarantee on its density. While some methods can, on the other hand, estimate multiple subtensors, they can give a guarantee on the density with respect to the input tensor for the first estimated subsensor only. We address these drawbacks by providing both theoretical and practical solution for estimating multiple dense subtensors in tensor data and giving a higher lower bound of the density. In particular, we guarantee and prove a higher bound of the lower-bound density of the estimated subgraph and subtensors. We also propose a novel approach to show that there are multiple dense subtensors with a guarantee on its density that is greater than the lower bound used in the state-of-the-art algorithms. We evaluate our approach with extensive experiments on several real-world datasets, which demonstrates its efficiency and feasibility.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5248
Author(s):  
Aleksandra Pawlicka ◽  
Marek Pawlicki ◽  
Rafał Kozik ◽  
Ryszard S. Choraś

This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security concerns. Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented. The contribution of this paper is two-fold: to date, to the best of our knowledge, there has been no work collecting the applications of recommenders for cybersecurity. Moreover, this paper attempts to complete a comprehensive survey of recommender types, after noticing that other works usually mention two–three types at once and neglect the others.


1987 ◽  
Vol 60 (3) ◽  
pp. 381-416 ◽  
Author(s):  
B. S. Nau

Abstract The understanding of the engineering fundamentals of rubber seals of all the various types has been developing gradually over the past two or three decades, but there is still much to understand, Tables V–VII summarize the state of the art. In the case of rubber-based gaskets, the field of high-temperature applications has scarcely been touched, although there are plans to initiate work in this area both in the U.S.A. at PVRC, and in the U.K., at BHRA. In the case of reciprocating rubber seals, a broad basis of theory and experiment has been developed, yet it still is not possible to design such a seal from first principles. Indeed, in a comparative series of experiments run recently on seals from a single batch, tested in different laboratories round the world to the same test procedure, under the aegis of an ISO working party, a very wide range of values was reported for leakage and friction. The explanation for this has still to be ascertained. In the case of rotary lip seals, theories and supporting evidence have been brought forward to support alternative hypotheses for lubrication and sealing mechanisms. None can be said to have become generally accepted, and it remains to crystallize a unified theory.


This paper provides a general note on the state of the art in the application of nondestructive testing techniques (NDT) for the detection of defects or deteriorations in metallic and nonmetallic oil and gas pipes. The advantages and disadvantages of each technique will be pointed out.


Resources ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 15
Author(s):  
Juan Uribe-Toril ◽  
José Luis Ruiz-Real ◽  
Jaime de Pablo Valenciano

Sustainability, local development, and ecology are keywords that cover a wide range of research fields in both experimental and social sciences. The transversal nature of this knowledge area creates synergies but also divergences, making a continuous review of the existing literature necessary in order to facilitate research. There has been an increasing number of articles that have analyzed trends in the literature and the state-of-the-art in many subjects. In this Special Issue of Resources, the most prestigious researchers analyzed the past and future of Social Sciences in Resources from an economic, social, and environmental perspective.


2013 ◽  
Vol 53 (1) ◽  
pp. 127
Author(s):  
Neil Wilds

Corrosion under insulation (CUI) is a serious issue in the oil and gas industry, with failures often occurring without warning and having devastating effect. When expensive redesign is not possible or practical, operators have a number of options open to them to mitigate the risk of CUI; these include the use of various protective coatings or thermally sprayed metals. Despite a number of technologies presently available, the industry is yet to establish an accepted laboratory test method for the performance benchmarking of products. This has, in the past, damaged confidence in some solutions and hampered the selection and further development of CUI coatings. As a result, the subject of accelerated laboratory testing for CUI coatings is now receiving significant attention across the industry with joint industry programs proposed in both Europe and North America. This paper will examine state-of-the-art accelerated CUI testing, evaluating the advantages and disadvantages of the existing methods available. It will then offer a detailed description of a test method that has been in use since 2004, testing more than 300 specimens and assessing a wide range of coating technologies. The reproducibility of the test program will be established by the presentation of a range of data including results obtained from a third-party test house. The third-party results will then be correlated with a seven-year case study from an end user perspective provided by Santos, a major Australian oil and gas exploration and production company, from experiences at their Port Bonython facility in SA.


2019 ◽  
Vol 9 (15) ◽  
pp. 2987
Author(s):  
Moritz Baier ◽  
Axel Schoenau ◽  
Francisco M. Soares ◽  
Martin Schell

Photonic integrated circuits (PICs) play a key role in a wide range of applications. Very often, the performance of PICs depends strongly on the state of polarization of light. Classically, this is regarded as undesirable, but more and more applications emerge that make explicit use of polarization dependence. In either case, the characterization of the polarization properties of a PIC can be a nontrivial task. We present a way of characterizing PICs in terms of their full Müller matrix, yielding a complete picture of their polarization properties. The approach is demonstrated by carrying out measurements of fabricated PICs.


1971 ◽  
Vol 25 (4) ◽  
pp. 430-439 ◽  
Author(s):  
Howard J. Sloane

This paper in a tabulated summary format discusses the state-of-the-art of Raman spectroscopy for commercially available instrumentation. A comparison to infrared is made in terms of (I) instrumentation, (II) sample handling, and (III) applications. Although the two techniques yield similar and often complementary information, they are quite different from the point of view of instrumentation and sampling procedures. This leads to various advantages and disadvantages or limitations for each. These are discussed as well as the future outlook.


2020 ◽  
Author(s):  
Tapadhir Das

In recent years, integrated circuits (ICs) have become<br>significant for various industries and their security has<br>been given greater priority, specifically in the supply chain.<br>Budgetary constraints have compelled IC designers to offshore manufacturing to third-party companies. When the designer gets the manufactured ICs back, it is imperative to test for potential threats like hardware trojans (HT). In this paper, a novel multilevel game-theoretic framework is introduced to analyze the interactions between a malicious IC manufacturer and the tester. In particular, the game is formulated as a non-cooperative, zerosum, repeated game using prospect theory (PT) that captures different players’ rationalities under uncertainty. The repeated game is separated into a learning stage, in which the defender<br><div>learns about the attacker’s tendencies, and an actual game stage, where this learning is used. Experiments show great incentive for the attacker to deceive the defender about their actual rationality by “playing dumb” in the learning stage (deception). This scenario is captured using hypergame theory to model the attacker’s view of the game. The optimal deception rationality of the attacker is analytically derived to maximize utility gain. For the defender, a first-step deception mitigation process is proposed to thwart the effects of deception. Simulation results show that the attacker can profit from the deception as it can successfully insert HTs in the manufactured ICs without being detected.</div><div><br></div><div>This paper has been accepted for publication in <b>IEEE Cyber Science Conference 2020</b><br></div>


Sign in / Sign up

Export Citation Format

Share Document