General
- Trust-hub: lots of resources, including Hardware Trojan benchmark database, tools, books, courses, and more
- Common Weaknesses Enumeration database (CWE) in hardware and software
- The OpenTitan project
- Counterfeit chips case
- DARPA Automatic Implementation of Secure Silicon (AISS) project
- Mentor (now Siemens) TrustChain automatic flow for logic locking and camouflaging
- AttifyOS: IoT Pen testing OS
- Hardware reverse engineering framework (HAL)
Notable hardware hacks
- Hacking the Intel ME engine by Positive Research group
- Breaking Xilinx 7 FPGA bitstream encryption
- SEM-based reverse engineering of a flash memory
- PACMAN
- Spectre and Meltdown
- Plundervolt: Voltage fault injection attack on SGX
Conferences, Journals and Workshops in Hardware Security
- Conference on Cryptographic Hardware and Embedded Systems (CHES)
- IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- Asian Hardware Oriented Security and Trust Symposium (AsianHOST)
- Hardwear.io Security Conference
- CAD for Hardware Security (CAD4Sec) Workshop
- Attacks and Solutions in Hardware Security (ASHES)
- Zero Trust Hardware Architectures Workshop (ZTHA)
- IEEE Workshop on Offensive Technologies (WOOT)
- Constructive Side-Channel Analysis and Secure Design ( COSADE)
- Journal of Hardware and Systems Security (HASS)
Conferences having tracks on Hardware Security
- Usenix Security
- ACM CCS
- Design Automation Conference (DAC)
- IEEE/ACM ICCAD
- Great Lakes Symposium on VLSI (GLSVLSI)
- VLSI-SoC
- blackhat
- International Symposium on Computer Architecture (ISCA)