IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 19 of 19  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS 2024-04-19
16:25
Tokyo
(Primary: On-site, Secondary: Online)
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging
Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) HWS2024-5
Hardware Trojan detection is a critical topic for maintaining the security of IC supply chain. Previous studies have rep... [more] HWS2024-5
pp.18-23
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
17:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Error detection and countermeasures caused by hardware trojan inserted computers
Takuro Kasai, Masashi Imai (Hirosaki Univ.) VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78
In recent years, the threat of hardware Trojans has become a serious problem. However, due to the nature of hardware Tro... [more] VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78
pp.206-211
CAS, CS 2022-03-04
13:45
Online Online Evaluation of Trojan Detector for AI Hardware
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] CAS2021-94 CS2021-96
pp.106-111
HWS, ICD [detail] 2021-10-19
14:20
Online Online Fundamental Study on Hardware Trojan Detection on Cable Using On-chip Sensor
Yo Nishitoba, Shugo Kaji (NAIST), Masahiro Kinugawa (Fukuchiyama Univ.), Daisuke Fujimoto, Yuichi Hayshi (NAIST) HWS2021-48 ICD2021-22
There have been reports of threats that cause information leakage by inserting Hardware Trojans (HT) into the connection... [more] HWS2021-48 ICD2021-22
pp.38-42
DC 2021-02-05
10:55
Online Online Hardware Trojan Detection by Learning Power Side Channel Signals Considering Random Process Variation
Michiko Inoue, Riaz-Ul-Haque Mian (NAIST) DC2020-70
Due to the globalization and complexity of the supply chain, there is a growing concern about the insertion of hardware ... [more] DC2020-70
pp.7-11
ICD, HWS [detail] 2020-10-26
14:55
Online Online Physical-Level Detection Approach against Hardware Trojans inside Semiconductor Chips (II)
Hirofumi Sakane, Shinichi Kawamura, Kentaro Imafuku, Yohei Hori, Makoto Nagata, Yuichi Hayashi, Tsutomu Matsumoto (AIST) HWS2020-35 ICD2020-24
Hardware Trojans, known to be designed and crafted with malicious intent and deployed to be part of the hardware of the ... [more] HWS2020-35 ICD2020-24
pp.59-64
ICD, HWS [detail] 2020-10-26
17:40
Online Online Investigation of High-Efficiency Simulation Method for Detection of Physical Design Falsification in Secure IC Chip
Kazuki Yasuda, Kazuki Monta, Daichi Nakagawa, Makoto Nagata (Kobe Univ.) HWS2020-41 ICD2020-30
With the development of the IoT society in recent years, various security measures have been developed for integrated ci... [more] HWS2020-41 ICD2020-30
pp.94-98
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-14
16:35
Ehime Ehime Prefecture Gender Equality Center Test Generation for Hardware Trojan Detection Using the Delay Difference of a Pair of Independent Paths
Suguru Rikino, Yushiro Hiramoto, Satoshi Ohtake (Oita Univ.) VLD2019-46 DC2019-70
Hardware Trojan detection is important to ensure security of LSIs.
If a hardware Trojan is inserted in a signal line o... [more]
VLD2019-46 DC2019-70
pp.151-155
HWS, ICD [detail] 2019-11-01
16:00
Osaka DNP Namba SS Bld. A Study of Hardware Trojan Detection Method using Deep Learning in Asynchronous Circuits
Hikaru Inafune, Masashi Imai (Hirosaki Univ.) HWS2019-63 ICD2019-24
There are typically two timing methods in VLSI designs known as
synchronous circuits which use a global clock and async... [more]
HWS2019-63 ICD2019-24
pp.35-40
HWS, ICD [detail] 2019-11-01
16:50
Osaka DNP Namba SS Bld. Physical-level detection approach against hardware Trojans inside semiconductor chips (I)
Shinichi Kawamura, Kentaro Imafuku, Hirofumi Sakane, Yohei Hori (AIST), Makoto Nagata (AIST/Kobe Univ.), Yuichi Hayashi (AIST/NAIST), Tsutomu Matsumoto (AIST/YNU) HWS2019-65 ICD2019-26
It is of great concern that malicious hardware should be inserted inside semiconductor chips and on printed circuit boar... [more] HWS2019-65 ICD2019-26
pp.47-52
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
13:10
Kochi Kochi University of Technology A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
pp.133-138
EMCJ 2018-07-27
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Fundamental Study on Data Injection Attacks Using a Hardware Trojan against ICT Devices
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-30
Intentional electromagnetic interference (IEMI) is a threat to destroy integrated circuits (ICs) or elements by using hi... [more] EMCJ2018-30
pp.49-54
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
15:25
Hokkaido Sapporo Convention Center A Study on Systematic Insertion of Hardware Trojan Based on Path Delay
Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43
This paper presents a non-reversible and analytical method for inserting a path delay hardware Trojan (PDHT). The conven... [more] ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43
pp.349-356
DC 2018-02-20
14:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Golden-Free Hardware Trojan Detection Technique Considering Intra-Die Variation
Fakir Sharif Hossain, Tomokazu Yoneda, Michihiro Shintani, Michiko Inoue (NAIST), Alex Orailoglu (Univ. of California, San Diego) DC2017-84
High detection sensitivity in the presence of process variation is a key challenge for hardware Trojan detection through... [more] DC2017-84
pp.43-48
DC 2017-12-15
15:55
Akita Akita Study Center, The Open University of Japan [Invited Talk] Hardware Trojan detection based on side-channel analysis
Michiko Inoue (NAIST) DC2017-76
A hardware Trojan, a malicious addition and/or modification to ICs, caused by outsourcing of design
and/or manufacturin... [more]
DC2017-76
pp.43-48
VLD, DC, CPSY, RECONF, CPM, ICD, IE
(Joint) [detail]
2016-11-30
11:45
Osaka Ritsumeikan University, Osaka Ibaraki Campus A Golden-IC Free Clock Tree Driven Authentication Approach for Hardware Trojan Detection
Fakir Sharif Hossain, Tomokazu Yoneda, Michiko Inoue (NAIST), Alex Orailoglu (UCSD) VLD2016-67 DC2016-61
Due to outsourcing of numerous stages of the IC manufacturing process in different foundries, security risks such as har... [more] VLD2016-67 DC2016-61
pp.135-140
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2015-12-03
09:45
Nagasaki Nagasaki Kinro Fukushi Kaikan Hardware Trojan Identification based on Netlist Features using SVM
Kento Hasegawa, Oya Masaru, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-58 DC2015-54
Recently, third-party IC vendors are very often used due to
globalization and cost-reduction in the IC market but malic... [more]
VLD2015-58 DC2015-54
pp.135-140
RECONF, CPSY, VLD, IPSJ-SLDM [detail] 2015-01-30
10:50
Kanagawa Hiyoshi Campus, Keio University A Hardware Trojan Detection Method based on Trojan net features
Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-137 CPSY2014-146 RECONF2014-70
Recently, digital ICs are designed by outside vendors to reduce costs
in semiconductor industry. This circumstance intr... [more]
VLD2014-137 CPSY2014-146 RECONF2014-70
pp.157-162
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2014-11-26
17:30
Oita B-ConPlaza A Hardware Trojans Detection Method focusing on Nets in Hardware Trojans in Gate-Level Netlists
Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-91 DC2014-45
Recently, digital ICs are designed by outside vendors to reduce design costs in semiconductor industry.
This circumstan... [more]
VLD2014-91 DC2014-45
pp.135-140
 Results 1 - 19 of 19  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan