Comments on "Defeating HaTCh: Building Malicious IP Cores"

04/13/2018
by   Syed Kamran Haider, et al.
0

Recently, Haider et al. introduced the first rigorous hardware Trojan detection algorithm called HaTCh. The foundation of HaTCh is a formal framework of hardware Trojan design, which formally characterizes all the hardware Trojans based on its properties. However, Bhardwaj et al. recently published one paper "Defeating HaTCh: Building Malicious IP Cores", which incorrectly claims that their newly designed hardware Trojan can evade the detection by HaTCh. In this paper, we explain why the claim of "defeating HaTCh" is incorrect, and we clarify several common misunderstandings about HaTCh.

READ FULL TEXT

page 1

page 2

page 3

research
09/18/2018

Validating the Claim - Defeating HaTCh : Building Malicious IP cores

This paper defends the design of hardware Trojan proposed in the paper "...
research
07/15/2019

Towards Near-imperceptible Steganographic Text

We show that the imperceptibility of several existing linguistic stegano...
research
03/04/2022

Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores

The availability of wide-ranging third-party intellectual property (3PIP...
research
08/21/2023

Unlocking Hardware Security Assurance: The Potential of LLMs

System-on-Chips (SoCs) form the crux of modern computing systems. SoCs e...
research
04/03/2020

Hardware Trojan with Frequency Modulation

The use of third-party IP cores in implementing applications in FPGAs ha...
research
03/19/2022

Discussion on a new extension of the FGM copula with application in reliability

A new extended Farlie-Gumbel-Morgenstern copula recently studied by Ebai...
research
12/09/2021

How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations

Modern hardware systems are composed of a variety of third-party Intelle...

Please sign up or login with your details

Forgot password? Click here to reset