Senjie Zhang1,2, Jinbo Wang2,*, Shan Zhou2, Jingpei Wang2,3, Zhenyong Zhang4,*, Ruixue Wang2
CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1027-1047, 2024, DOI:10.32604/cmc.2023.046355
- 30 January 2024
Abstract The globalization of hardware designs and supply chains, as well as the integration of third-party intellectual property (IP) cores, has led to an increased focus from malicious attackers on computing hardware. However, existing defense or detection approaches often require additional circuitry to perform security verification, and are thus constrained by time and resource limitations. Considering the scale of actual engineering tasks and tight project schedules, it is usually difficult to implement designs for all modules in field programmable gate array (FPGA) circuits. Some studies have pointed out that the failure of key modules tends to… More >