Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 15:25 |
Hokkaido |
Sapporo Convention Center |
A Study on Systematic Insertion of Hardware Trojan Based on Path Delay Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 |
This paper presents a non-reversible and analytical method for inserting a path delay hardware Trojan (PDHT). The conven... [more] |
ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 pp.349-356 |
DC |
2018-02-20 14:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Golden-Free Hardware Trojan Detection Technique Considering Intra-Die Variation Fakir Sharif Hossain, Tomokazu Yoneda, Michihiro Shintani, Michiko Inoue (NAIST), Alex Orailoglu (Univ. of California, San Diego) DC2017-84 |
High detection sensitivity in the presence of process variation is a key challenge for hardware Trojan detection through... [more] |
DC2017-84 pp.43-48 |
DC |
2017-12-15 15:55 |
Akita |
Akita Study Center, The Open University of Japan |
[Invited Talk]
Hardware Trojan detection based on side-channel analysis Michiko Inoue (NAIST) DC2017-76 |
A hardware Trojan, a malicious addition and/or modification to ICs, caused by outsourcing of design
and/or manufacturin... [more] |
DC2017-76 pp.43-48 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE (Joint) [detail] |
2016-11-30 11:45 |
Osaka |
Ritsumeikan University, Osaka Ibaraki Campus |
A Golden-IC Free Clock Tree Driven Authentication Approach for Hardware Trojan Detection Fakir Sharif Hossain, Tomokazu Yoneda, Michiko Inoue (NAIST), Alex Orailoglu (UCSD) VLD2016-67 DC2016-61 |
Due to outsourcing of numerous stages of the IC manufacturing process in different foundries, security risks such as har... [more] |
VLD2016-67 DC2016-61 pp.135-140 |
MSS, CAS, IPSJ-AL [detail] |
2016-11-24 10:00 |
Hyogo |
Kobe Institute of Computing |
Hardware Trojan with Sensor Trigger Takato Iwase, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-58 MSS2016-38 |
Recently, in-vehicle system technology has been rapidly developed. However, in-vehicle system is vulnerable because of s... [more] |
CAS2016-58 MSS2016-38 pp.1-6 |
VLD, CAS, MSS, SIP |
2016-06-17 15:50 |
Aomori |
Hirosaki Shiritsu Kanko-kan |
A Study on Fault Tolerant Features of Asynchronous Circuits using Voted-enable Latches Masashi Imai (Hirosaki Univ.), Tomohiro Yoneda (NII) CAS2016-33 VLD2016-39 SIP2016-67 MSS2016-33 |
A bit flip caused by voltage fluctuation, soft errors, and hardware Trojans becomes one of serious issues in the modern ... [more] |
CAS2016-33 VLD2016-39 SIP2016-67 MSS2016-33 pp.179-184 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-03 09:45 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
Hardware Trojan Identification based on Netlist Features using SVM Kento Hasegawa, Oya Masaru, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-58 DC2015-54 |
Recently, third-party IC vendors are very often used due to
globalization and cost-reduction in the IC market but malic... [more] |
VLD2015-58 DC2015-54 pp.135-140 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-03 10:10 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
A Quantitative Criterion of Gate-Level Netlist Vulnerability Masaru Oya, Youhua Shi (Waseda Univ.), Noritaka Yamashita, Toshihiko Okamura, Yukiyasu Tsunoo (NEC), Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-59 DC2015-55 |
Recently, digital ICs are designed by outside vendors to reduce costs in semiconductor industry.
This circumstance intr... [more] |
VLD2015-59 DC2015-55 pp.141-146 |
VLD |
2015-03-04 13:25 |
Okinawa |
Okinawa Seinen Kaikan |
A Score-Based Hardware-Trojan Identification Method for Gate-Level Netlists Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-182 |
Recently, digital ICs are designed by outside vendors to reduce costs
in semiconductor industry. This circumstance intr... [more] |
VLD2014-182 pp.165-170 |
RECONF, CPSY, VLD, IPSJ-SLDM [detail] |
2015-01-30 10:50 |
Kanagawa |
Hiyoshi Campus, Keio University |
A Hardware Trojan Detection Method based on Trojan net features Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-137 CPSY2014-146 RECONF2014-70 |
Recently, digital ICs are designed by outside vendors to reduce costs
in semiconductor industry. This circumstance intr... [more] |
VLD2014-137 CPSY2014-146 RECONF2014-70 pp.157-162 |
ICD, CPSY |
2014-12-01 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Poster Presentation]
A study of a hardware Trojan-based antitheft system Yoshitaka Nakashima, Yasushi Tsukada, Takeshi Kumaki (Ritsumeikan Univ), Masaya Yoshikawa (Meijo Univ), Takeshi Fujino (Ritsumeikan Univ) ICD2014-78 CPSY2014-90 |
Recently, with the revolution of smartphones, many people preserve some private information in smartphone which are cont... [more] |
ICD2014-78 CPSY2014-90 p.29 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2014-11-26 17:30 |
Oita |
B-ConPlaza |
A Hardware Trojans Detection Method focusing on Nets in Hardware Trojans in Gate-Level Netlists Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-91 DC2014-45 |
Recently, digital ICs are designed by outside vendors to reduce design costs in semiconductor industry.
This circumstan... [more] |
VLD2014-91 DC2014-45 pp.135-140 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2013-11-28 13:20 |
Kagoshima |
|
Study of the Hardware Trojan for Embedded Processor Yasushi Tsukada, Shuhei Itaya, Takeshi Kumaki (Ritsumeikan Univ.), Masaya Yoshikawa (Meijou Univ), Takeshi Fujino (Ritsumeikan Univ.) CPSY2013-64 |
In recent years, much attention is paid to the threat and measure of LSI Hardware Trojan.
Hardware Trojan is the circui... [more] |
CPSY2013-64 pp.29-34 |
VLD |
2013-03-06 15:10 |
Okinawa |
Okinawa Seinen Kaikan |
Trojan Circuit for Fault Analysis Countermeasure and its Implementation Takaya Tsukadaira, Daisuke Matsushima (Meijo Univ.), Takeshi Kumaki (Ritsumeikan Univ.), Masaya Yoshikawa (Meijo Univ.) VLD2012-161 |
Recently, the threat of hardware Trojans in forged integrated circuits has become serious problem due to the advancement... [more] |
VLD2012-161 pp.141-146 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2011-11-29 14:15 |
Miyazaki |
NewWelCity Miyazaki |
A Study on Hardware Trojyan embedded Manchurian LSI for Cipher processing Takeshi Kumaki, Youhei Mochizuki, Takeshi Fujino (Ritsumeikan Univ.) CPSY2011-46 |
In recent years, several researches for hardware Trojan and its detecting method are becoming to active rapidly.
The h... [more] |
CPSY2011-46 pp.21-26 |