I would say that Trivium is still secure, but the ASIC example given in the paper is not. The security of an ASIC implementation is only as good as the person who created the design for the ASIC. Generally, if you give me:
- reset control
- clock control
- VDD control
I likely will be able to extract information from a single-rail, synchronous system. (note: A single-rail system is what you learn about in school. You have logic between two latches that are controlled by a clock.) You will find that most every attack for hardware uses these three items. One of the reason is that HDLs generally target single-rail, synchronous systems. In the paper, a VHDL generated layout for TSMC 90nm was used, and this is an easier case as the pFET device are much weaker on this this process compared to nFETs so you can easily create glitches. (FYI, this attack won't work on TSMC 7nm because the matching is too close due to the fully-depleted channels to create the glitches, so maybe you could get away with a secure single-rail implementation?)
In order to have ASICs that are robust to these sorts of attacks, you need to minimize access to the list above. When I do a SIMON implementation, I use dual-rail encoding (note: dual-rail encoding is where you pass the logic S and the compliment, !S. In this way, you can guarantee the integrity of the data, it also guarantees constant current draw, zeroth order ), so I pass around complimentary lines which means that you cannot do a power trace or glitch based on the clock because you get an XOR check that the logic is inverse of the other. This allows protection from glitches in a synchronous system. (There's something called RAZR from the University of Michigan that uses something similar and can show you the circuits.) Also, if I have a dual-rail implementation, I generally use asynchronous approaches which are clockless where you load the data into the register and then say "go" and you get an answer that is robust to clock and VDD changes.
edit: I looked for, and couldn't find, the HDL used to create the IC in the paper.
edit2: A paper that shows the effects of dual rail encoding, figure 15.