Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2024-04-19 16:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) HWS2024-5 |
Hardware Trojan detection is a critical topic for maintaining the security of IC supply chain. Previous studies have rep... [more] |
HWS2024-5 pp.18-23 |
HWS |
2024-04-19 17:15 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Supply chain security of semiconductor chips and countermeasure design technologies Makoto Nagata (Kobe Univ.), Kazuki Monta (Secafy Co., Ltd.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) HWS2024-7 |
This report is dedicated to the threats and countermeasures of semiconductor supply chain security, regarding the authen... [more] |
HWS2024-7 pp.30-33 |
HWS |
2023-04-14 13:20 |
Oita |
(Primary: On-site, Secondary: Online) |
Exploration of hardware Trojan detection through power supply current simulation Takafumi Oki, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2023-1 |
The recent development of information and communication technology has increased the demand for integrated circuit (IC) ... [more] |
HWS2023-1 pp.1-5 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 17:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Error detection and countermeasures caused by hardware trojan inserted computers Takuro Kasai, Masashi Imai (Hirosaki Univ.) VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78 |
In recent years, the threat of hardware Trojans has become a serious problem. However, due to the nature of hardware Tro... [more] |
VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78 pp.206-211 |
HWS, ICD |
2022-10-25 11:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Optical Microscopic Observation of Semiconductor Devices toward Hardware Trojan Detection Hirofumi Sakane, Junichi Sakamoto, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ.), Yuichi Hayashi (NAIST) HWS2022-34 ICD2022-26 |
In this paper we focus on detection of hardware Trojan (HT) in semiconductor devices under a scenario with following ste... [more] |
HWS2022-34 ICD2022-26 pp.23-28 |
VLD, HWS [detail] |
2022-03-08 16:10 |
Online |
Online |
Fundamental Evaluation Method for EM Information Leakage Caused by Hardware Trojans on Signal Cables
-- Impact of Modulation Factor and Emission Intensity -- Taiga Yukawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-103 HWS2021-80 |
The threats of electromagnetic (EM) information leakage caused by hardware Trojans (HTs) implemented on signal cables ha... [more] |
VLD2021-103 HWS2021-80 pp.153-157 |
CAS, CS |
2022-03-04 13:45 |
Online |
Online |
Evaluation of Trojan Detector for AI Hardware Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96 |
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] |
CAS2021-94 CS2021-96 pp.106-111 |
HWS, ICD [detail] |
2021-10-19 14:20 |
Online |
Online |
Fundamental Study on Hardware Trojan Detection on Cable Using On-chip Sensor Yo Nishitoba, Shugo Kaji (NAIST), Masahiro Kinugawa (Fukuchiyama Univ.), Daisuke Fujimoto, Yuichi Hayshi (NAIST) HWS2021-48 ICD2021-22 |
There have been reports of threats that cause information leakage by inserting Hardware Trojans (HT) into the connection... [more] |
HWS2021-48 ICD2021-22 pp.38-42 |
DC |
2021-02-05 10:55 |
Online |
Online |
Hardware Trojan Detection by Learning Power Side Channel Signals Considering Random Process Variation Michiko Inoue, Riaz-Ul-Haque Mian (NAIST) DC2020-70 |
Due to the globalization and complexity of the supply chain, there is a growing concern about the insertion of hardware ... [more] |
DC2020-70 pp.7-11 |
VLD, DC, RECONF, ICD, IPSJ-SLDM (Joint) [detail] |
2020-11-18 14:25 |
Online |
Online |
On-chip power supply noise monitoring for evaluation of multi-chip board power delivery networks Daichi Nakagawa, Kazuki Yasuda, Masaru Mashiba, Kazuki Monta, Takaaki Okidono, Takuji Miki, Makoto Nagata (Kobe Univ) VLD2020-31 ICD2020-51 DC2020-51 RECONF2020-50 |
In these days, information and communication technology has been evolving more and more, and hardware security has been ... [more] |
VLD2020-31 ICD2020-51 DC2020-51 RECONF2020-50 pp.115-117 |
ICD, HWS [detail] |
2020-10-26 14:55 |
Online |
Online |
Physical-Level Detection Approach against Hardware Trojans inside Semiconductor Chips (II) Hirofumi Sakane, Shinichi Kawamura, Kentaro Imafuku, Yohei Hori, Makoto Nagata, Yuichi Hayashi, Tsutomu Matsumoto (AIST) HWS2020-35 ICD2020-24 |
Hardware Trojans, known to be designed and crafted with malicious intent and deployed to be part of the hardware of the ... [more] |
HWS2020-35 ICD2020-24 pp.59-64 |
ICD, HWS [detail] |
2020-10-26 15:20 |
Online |
Online |
Hardware Trojan using LUT Structure of AI Inference Devices Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-36 ICD2020-25 |
The artificial intelligence (AI) technology has been attracted attention in several fields. On the other hand, security ... [more] |
HWS2020-36 ICD2020-25 pp.65-70 |
ICD, HWS [detail] |
2020-10-26 15:45 |
Online |
Online |
Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26 |
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] |
HWS2020-37 ICD2020-26 pp.71-76 |
ICD, HWS [detail] |
2020-10-26 17:40 |
Online |
Online |
Investigation of High-Efficiency Simulation Method for Detection of Physical Design Falsification in Secure IC Chip Kazuki Yasuda, Kazuki Monta, Daichi Nakagawa, Makoto Nagata (Kobe Univ.) HWS2020-41 ICD2020-30 |
With the development of the IoT society in recent years, various security measures have been developed for integrated ci... [more] |
HWS2020-41 ICD2020-30 pp.94-98 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-14 16:35 |
Ehime |
Ehime Prefecture Gender Equality Center |
Test Generation for Hardware Trojan Detection Using the Delay Difference of a Pair of Independent Paths Suguru Rikino, Yushiro Hiramoto, Satoshi Ohtake (Oita Univ.) VLD2019-46 DC2019-70 |
Hardware Trojan detection is important to ensure security of LSIs.
If a hardware Trojan is inserted in a signal line o... [more] |
VLD2019-46 DC2019-70 pp.151-155 |
HWS, ICD [detail] |
2019-11-01 16:00 |
Osaka |
DNP Namba SS Bld. |
A Study of Hardware Trojan Detection Method using Deep Learning in Asynchronous Circuits Hikaru Inafune, Masashi Imai (Hirosaki Univ.) HWS2019-63 ICD2019-24 |
There are typically two timing methods in VLSI designs known as
synchronous circuits which use a global clock and async... [more] |
HWS2019-63 ICD2019-24 pp.35-40 |
HWS, ICD [detail] |
2019-11-01 16:50 |
Osaka |
DNP Namba SS Bld. |
Physical-level detection approach against hardware Trojans inside semiconductor chips (I) Shinichi Kawamura, Kentaro Imafuku, Hirofumi Sakane, Yohei Hori (AIST), Makoto Nagata (AIST/Kobe Univ.), Yuichi Hayashi (AIST/NAIST), Tsutomu Matsumoto (AIST/YNU) HWS2019-65 ICD2019-26 |
It is of great concern that malicious hardware should be inserted inside semiconductor chips and on printed circuit boar... [more] |
HWS2019-65 ICD2019-26 pp.47-52 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 |
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] |
ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 pp.133-138 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 |
The threats of electromagnetic (EM) information leakage from the input/output (I/O) signal of an IC mounted on a de-vice... [more] |
ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 pp.235-238 |
EMCJ |
2018-07-27 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fundamental Study on Data Injection Attacks Using a Hardware Trojan against ICT Devices Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-30 |
Intentional electromagnetic interference (IEMI) is a threat to destroy integrated circuits (ICs) or elements by using hi... [more] |
EMCJ2018-30 pp.49-54 |