2011
DOI: 10.1109/tifs.2011.2136339
|View full text |Cite
|
Sign up to set email alerts
|

An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…Large TSV pitch can lead to area inefficiencies [50] [84] are estimated, and Trojans are identified. GLC shares the limitations of other fingerprinting techniques (e.g., [89] VIII. CONCLUSIONS TPAD protects digital systems from hardware Trojan attacks through a combination of special concurrent error detection techniques and selective programmability.…”
Section: B Tpad Vs Other Techniquesmentioning
confidence: 99%
“…Large TSV pitch can lead to area inefficiencies [50] [84] are estimated, and Trojans are identified. GLC shares the limitations of other fingerprinting techniques (e.g., [89] VIII. CONCLUSIONS TPAD protects digital systems from hardware Trojan attacks through a combination of special concurrent error detection techniques and selective programmability.…”
Section: B Tpad Vs Other Techniquesmentioning
confidence: 99%
“…Additional methods reduce the overall test effort, e. g. via statistical analysis or state space obfuscation [11], [12]. It is also possible to compare physical parameters of a chip to a Trojan-free reference chip -the golden model -allowing the detection of side channels [13]- [15]. Invasion refers to the insertion of additional circuits into a design without changing its original functionality in order to test it after production [13], [16].…”
Section: Related Workmentioning
confidence: 99%
“…It is also possible to compare physical parameters of a chip to a Trojan-free reference chip -the golden model -allowing the detection of side channels [13]- [15]. Invasion refers to the insertion of additional circuits into a design without changing its original functionality in order to test it after production [13], [16]. In combination with Trojan detection, their localization is also of interest.…”
Section: Related Workmentioning
confidence: 99%
“…Existence of a malicious IP core invalidates the applicability of many of the previously proposed methods for Hardware Trojan detection [1,6,19,23,31,32]. Most of the existing methods rely on golden models to generate the fingerprints and compare them with those measured from circuit-under-test using certain data analysis methods.…”
Section: Introductionmentioning
confidence: 99%