Proceedings of the 9th Workshop on Embedded Systems Security 2014
DOI: 10.1145/2668322.2668325
|View full text |Cite
|
Sign up to set email alerts
|

A signature based architecture for Trojan detection

Abstract: Trust in the integrated circuit (IC) fabrication industry is an ongoing concern given the trend towards "fabless" design and associated use of third-parties for fabrication. A Hardware Trojan (HT) introduced during fabrication can corrupt an IC's outputs, leak secret information, and yet go undetected by traditional system testing techniques. In this paper we propose an architecture to detect HTs during IC test or at run-time. An HT that would corrupt an IC's output and otherwise proceed undetected will then b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…The effects can be catastrophic, such as system failure and leakage of secret encryption keys (e.g., failure of ice-detection module in the P-8A Poseidon [2]), making it imperative to develop effective HT detection techniques. Some of the contemporary HT detection techniques utilize the timing [3] [4], power [5][6] [7], current or electromagnetic signals based golden signatures to detect anomalous electrical behavior [8] [9]. However, in case of the third-party-IP based designs, it is nearly impossible to extract the golden signatures.…”
Section: Introductionmentioning
confidence: 99%
“…The effects can be catastrophic, such as system failure and leakage of secret encryption keys (e.g., failure of ice-detection module in the P-8A Poseidon [2]), making it imperative to develop effective HT detection techniques. Some of the contemporary HT detection techniques utilize the timing [3] [4], power [5][6] [7], current or electromagnetic signals based golden signatures to detect anomalous electrical behavior [8] [9]. However, in case of the third-party-IP based designs, it is nearly impossible to extract the golden signatures.…”
Section: Introductionmentioning
confidence: 99%