2015
DOI: 10.1142/s0218126615501157
|View full text |Cite
|
Sign up to set email alerts
|

A Trust-Driven Placement Approach: A New Perspective on Design for Hardware Trust

Abstract: During the last few years, hardware Trojan horses (HTHs) have become one of the most important threats to the security of very large scale integrated (VLSI) chips. Many e®orts have been made to facilitate the process of HTH detection, mostly based on the power analysis of chips. The techniques would be more bene¯cial if trust-driven techniques are used during the system design. Whereas design for hardware trust (DFHT) is one of the¯elds of interest, most current approaches include ad-hoc and gate-level design … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…The addition of scan-chain features has little effect on the time complexity of the whole feature extraction algorithm. Therefore, there is no significant difference in time between our feature extraction algorithm and [20] and [21].…”
Section: Analysis Of Time Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…The addition of scan-chain features has little effect on the time complexity of the whole feature extraction algorithm. Therefore, there is no significant difference in time between our feature extraction algorithm and [20] and [21].…”
Section: Analysis Of Time Complexitymentioning
confidence: 99%
“…Formal verification method does not directly detect HT, but attempts to evaluate the reliability of IP core, and designs IP cores through trust strategies to improve the security of integrated circuits. In addition, the technology can isolate infected thirdparty IP through software scheduling protocol [20] or the correlation of input signals [21].…”
Section: A Formal Verifcationmentioning
confidence: 99%
“…1). It is difficult to protect against such threats, but some solutions based on ad-hoc design and verification methods have been proposed [18], [19].…”
Section: Fig 1 Mains Threats To Ic Integritymentioning
confidence: 99%