2014 IEEE 23rd Asian Test Symposium 2014
DOI: 10.1109/ats.2014.44
|View full text |Cite
|
Sign up to set email alerts
|

A Resizing Method to Minimize Effects of Hardware Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…MOLES [ 42 ] proposed the use of new payloads that could generate intentional side-channel signals to leak secret information. To evade detection, a circuit with gate resizing was redesigned at minimal cost without impacting the circuit’s functionality [ 43 ]. Zero overhead malicious modifications were proposed for high-performance and embedded microprocessors, where hardware Trojans were activated under specific conditions to obfuscate modifications [ 44 ].…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…MOLES [ 42 ] proposed the use of new payloads that could generate intentional side-channel signals to leak secret information. To evade detection, a circuit with gate resizing was redesigned at minimal cost without impacting the circuit’s functionality [ 43 ]. Zero overhead malicious modifications were proposed for high-performance and embedded microprocessors, where hardware Trojans were activated under specific conditions to obfuscate modifications [ 44 ].…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…The difficulty of detecting hardware trojans is determined by their triggers. Considerable research has been conducted on IC trojan design and the evaluation of new triggers [41][42][43][44]. However, much more research has been performed on the development of methodologies for countermeasures, which can be broadly classified as detection methods [39,[45][46][47][48], and prevention methods [49][50][51][52][53][54].…”
Section: Sensorsmentioning
confidence: 99%
“…Designing and defending against HTs in a chip has been a hot research topic [2,3,4,1,5,6]. Various HTs and countermeasures have been proposed [2,7,8,9,10,11,12]. A typical HT is made of the trigger, the Trojan circuit and the payload [1].…”
Section: Hardware Trojansmentioning
confidence: 99%