AI-BASED DETECTION AND SIMULATION OF HARDWARE TROJAN ATTACKS IN INDUSTRIAL APPLICATIONS
DOI:
https://doi.org/10.64751/Abstract
The widespread use of integrated circuits (ICs) across various applications has raised significant concerns about
hardware security, particularly in relation to Hardware Trojans (HTs). These are malicious modifications secretly inserted into
ICs that can disrupt functionality, leak sensitive information, or even cause denial of service. As the reliance on electronic systems
continues to grow, ensuring the security and integrity of hardware components has become increasingly important.
This paper presents a detailed survey of Hardware Trojans, examining their characteristics, potential threats, and the challenges
they pose to modern hardware systems. It begins by outlining the structural properties of HTs and classifying them based on recent
developments in research. This classification helps in understanding how these threats are designed and how they operate within
integrated circuits.The study further explores advanced detection and prevention techniques, analyzing their effectiveness along
with their advantages and limitations. Various approaches, including testing-based, runtime monitoring, and design-for-trust
methods, are discussed to highlight current strategies in mitigating HT risks. Finally, the paper addresses emerging trends in
hardware security and emphasizes the necessity for developing more robust and adaptive solutions to counter increasingly
sophisticated HT attacks. The insights provided aim to support ongoing research efforts in strengthening the security of integrated
circuit design and deployment.







