2017
DOI: 10.1109/tetc.2017.2654268
|View full text |Cite
|
Sign up to set email alerts
|

A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 41 publications
(9 citation statements)
references
References 37 publications
0
9
0
Order By: Relevance
“…Hardware Trojan Counteracts: the methods are categorized as: (1) Detections [100]- [102], (2) Design for security [103]- [105], and (3) Runtime monitoring [106]- [107]. Detection is the technique that determines whether a trojan exists in a piece of IC.…”
Section: Watermarkingmentioning
confidence: 99%
“…Hardware Trojan Counteracts: the methods are categorized as: (1) Detections [100]- [102], (2) Design for security [103]- [105], and (3) Runtime monitoring [106]- [107]. Detection is the technique that determines whether a trojan exists in a piece of IC.…”
Section: Watermarkingmentioning
confidence: 99%
“…Trojans of small sizes can effectively "hide" in the margins of the fabrication process. The same way antivirus detection routines has evolved from simple static checks to signature-less approaches, trojan detection has also shifted to dynamic approaches like concurrent execution and (self-)checking [13]. Other attacks that target hardware take different forms.…”
Section: Re-imagining Software Threats and Defencesmentioning
confidence: 99%
“…However, Chakraborty and Pagliarini [32] proved that when the Trojan triggers probability is less than 10 −3 , MERO will be difficult to detect Trojans.…”
Section: B Circuit Feature Analysismentioning
confidence: 99%