2008 IEEE International Workshop on Hardware-Oriented Security and Trust 2008
DOI: 10.1109/hst.2008.4559047
|View full text |Cite
|
Sign up to set email alerts
|

A region based approach for the identification of hardware Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
97
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 208 publications
(97 citation statements)
references
References 10 publications
0
97
0
Order By: Relevance
“…Side-channel approaches of detecting Trojans belong to a class of generic powerful techniques for IC authentication, and are conceptually applicable to Trojans of all operational modes and to designs of arbitrary size and complexity. Only local activation of the Trojans is sufficient to detect them, and methods have been proposed to maximize the possibility of locally activating Trojans [9]. However, there are two main issues with the side-channel based approaches that limit their practical applicability:…”
Section: Trojan Detection: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Side-channel approaches of detecting Trojans belong to a class of generic powerful techniques for IC authentication, and are conceptually applicable to Trojans of all operational modes and to designs of arbitrary size and complexity. Only local activation of the Trojans is sufficient to detect them, and methods have been proposed to maximize the possibility of locally activating Trojans [9]. However, there are two main issues with the side-channel based approaches that limit their practical applicability:…”
Section: Trojan Detection: Previous Workmentioning
confidence: 99%
“…the ones with few logic gates. Thus, the technique can be used as complementary to the side-channel Trojan detection approaches [1,9,10,11] which are more effective in detecting large Trojans (e.g. ones with area > 0.1% of the total circuit area).…”
Section: Introductionmentioning
confidence: 99%
“…Banga and Hsiao developed a two-stage test generation technique that targets magnifying the difference between the IUA and the genuine design power waveforms. 19 In the first stage (circuit partitioning), a region-aware pattern helps identify the potential Trojan insertion regions.…”
Section: Trojan Activation Methodsmentioning
confidence: 99%
“…Banga et al [4,3] propose a region-based testing that first identifies the problematic regions based on power signatures and then performs more tests on the region. The underlying mathematical and logical circuit structure or the process variations are not considered.…”
Section: Related Workmentioning
confidence: 99%