Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2024-04-19 16:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) HWS2024-5 |
Hardware Trojan detection is a critical topic for maintaining the security of IC supply chain. Previous studies have rep... [more] |
HWS2024-5 pp.18-23 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 17:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Error detection and countermeasures caused by hardware trojan inserted computers Takuro Kasai, Masashi Imai (Hirosaki Univ.) VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78 |
In recent years, the threat of hardware Trojans has become a serious problem. However, due to the nature of hardware Tro... [more] |
VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78 pp.206-211 |
CAS, CS |
2022-03-04 13:45 |
Online |
Online |
Evaluation of Trojan Detector for AI Hardware Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96 |
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] |
CAS2021-94 CS2021-96 pp.106-111 |
HWS, ICD [detail] |
2021-10-19 14:20 |
Online |
Online |
Fundamental Study on Hardware Trojan Detection on Cable Using On-chip Sensor Yo Nishitoba, Shugo Kaji (NAIST), Masahiro Kinugawa (Fukuchiyama Univ.), Daisuke Fujimoto, Yuichi Hayshi (NAIST) HWS2021-48 ICD2021-22 |
There have been reports of threats that cause information leakage by inserting Hardware Trojans (HT) into the connection... [more] |
HWS2021-48 ICD2021-22 pp.38-42 |
DC |
2021-02-05 10:55 |
Online |
Online |
Hardware Trojan Detection by Learning Power Side Channel Signals Considering Random Process Variation Michiko Inoue, Riaz-Ul-Haque Mian (NAIST) DC2020-70 |
Due to the globalization and complexity of the supply chain, there is a growing concern about the insertion of hardware ... [more] |
DC2020-70 pp.7-11 |
ICD, HWS [detail] |
2020-10-26 14:55 |
Online |
Online |
Physical-Level Detection Approach against Hardware Trojans inside Semiconductor Chips (II) Hirofumi Sakane, Shinichi Kawamura, Kentaro Imafuku, Yohei Hori, Makoto Nagata, Yuichi Hayashi, Tsutomu Matsumoto (AIST) HWS2020-35 ICD2020-24 |
Hardware Trojans, known to be designed and crafted with malicious intent and deployed to be part of the hardware of the ... [more] |
HWS2020-35 ICD2020-24 pp.59-64 |
ICD, HWS [detail] |
2020-10-26 17:40 |
Online |
Online |
Investigation of High-Efficiency Simulation Method for Detection of Physical Design Falsification in Secure IC Chip Kazuki Yasuda, Kazuki Monta, Daichi Nakagawa, Makoto Nagata (Kobe Univ.) HWS2020-41 ICD2020-30 |
With the development of the IoT society in recent years, various security measures have been developed for integrated ci... [more] |
HWS2020-41 ICD2020-30 pp.94-98 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-14 16:35 |
Ehime |
Ehime Prefecture Gender Equality Center |
Test Generation for Hardware Trojan Detection Using the Delay Difference of a Pair of Independent Paths Suguru Rikino, Yushiro Hiramoto, Satoshi Ohtake (Oita Univ.) VLD2019-46 DC2019-70 |
Hardware Trojan detection is important to ensure security of LSIs.
If a hardware Trojan is inserted in a signal line o... [more] |
VLD2019-46 DC2019-70 pp.151-155 |
HWS, ICD [detail] |
2019-11-01 16:00 |
Osaka |
DNP Namba SS Bld. |
A Study of Hardware Trojan Detection Method using Deep Learning in Asynchronous Circuits Hikaru Inafune, Masashi Imai (Hirosaki Univ.) HWS2019-63 ICD2019-24 |
There are typically two timing methods in VLSI designs known as
synchronous circuits which use a global clock and async... [more] |
HWS2019-63 ICD2019-24 pp.35-40 |
HWS, ICD [detail] |
2019-11-01 16:50 |
Osaka |
DNP Namba SS Bld. |
Physical-level detection approach against hardware Trojans inside semiconductor chips (I) Shinichi Kawamura, Kentaro Imafuku, Hirofumi Sakane, Yohei Hori (AIST), Makoto Nagata (AIST/Kobe Univ.), Yuichi Hayashi (AIST/NAIST), Tsutomu Matsumoto (AIST/YNU) HWS2019-65 ICD2019-26 |
It is of great concern that malicious hardware should be inserted inside semiconductor chips and on printed circuit boar... [more] |
HWS2019-65 ICD2019-26 pp.47-52 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 |
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] |
ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 pp.133-138 |
EMCJ |
2018-07-27 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fundamental Study on Data Injection Attacks Using a Hardware Trojan against ICT Devices Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-30 |
Intentional electromagnetic interference (IEMI) is a threat to destroy integrated circuits (ICs) or elements by using hi... [more] |
EMCJ2018-30 pp.49-54 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 15:25 |
Hokkaido |
Sapporo Convention Center |
A Study on Systematic Insertion of Hardware Trojan Based on Path Delay Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 |
This paper presents a non-reversible and analytical method for inserting a path delay hardware Trojan (PDHT). The conven... [more] |
ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 pp.349-356 |
DC |
2018-02-20 14:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Golden-Free Hardware Trojan Detection Technique Considering Intra-Die Variation Fakir Sharif Hossain, Tomokazu Yoneda, Michihiro Shintani, Michiko Inoue (NAIST), Alex Orailoglu (Univ. of California, San Diego) DC2017-84 |
High detection sensitivity in the presence of process variation is a key challenge for hardware Trojan detection through... [more] |
DC2017-84 pp.43-48 |
DC |
2017-12-15 15:55 |
Akita |
Akita Study Center, The Open University of Japan |
[Invited Talk]
Hardware Trojan detection based on side-channel analysis Michiko Inoue (NAIST) DC2017-76 |
A hardware Trojan, a malicious addition and/or modification to ICs, caused by outsourcing of design
and/or manufacturin... [more] |
DC2017-76 pp.43-48 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE (Joint) [detail] |
2016-11-30 11:45 |
Osaka |
Ritsumeikan University, Osaka Ibaraki Campus |
A Golden-IC Free Clock Tree Driven Authentication Approach for Hardware Trojan Detection Fakir Sharif Hossain, Tomokazu Yoneda, Michiko Inoue (NAIST), Alex Orailoglu (UCSD) VLD2016-67 DC2016-61 |
Due to outsourcing of numerous stages of the IC manufacturing process in different foundries, security risks such as har... [more] |
VLD2016-67 DC2016-61 pp.135-140 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-03 09:45 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
Hardware Trojan Identification based on Netlist Features using SVM Kento Hasegawa, Oya Masaru, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-58 DC2015-54 |
Recently, third-party IC vendors are very often used due to
globalization and cost-reduction in the IC market but malic... [more] |
VLD2015-58 DC2015-54 pp.135-140 |
RECONF, CPSY, VLD, IPSJ-SLDM [detail] |
2015-01-30 10:50 |
Kanagawa |
Hiyoshi Campus, Keio University |
A Hardware Trojan Detection Method based on Trojan net features Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-137 CPSY2014-146 RECONF2014-70 |
Recently, digital ICs are designed by outside vendors to reduce costs
in semiconductor industry. This circumstance intr... [more] |
VLD2014-137 CPSY2014-146 RECONF2014-70 pp.157-162 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2014-11-26 17:30 |
Oita |
B-ConPlaza |
A Hardware Trojans Detection Method focusing on Nets in Hardware Trojans in Gate-Level Netlists Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-91 DC2014-45 |
Recently, digital ICs are designed by outside vendors to reduce design costs in semiconductor industry.
This circumstan... [more] |
VLD2014-91 DC2014-45 pp.135-140 |