2017
DOI: 10.1007/s41635-017-0001-6
|View full text |Cite
|
Sign up to set email alerts
|

Benchmarking of Hardware Trojans and Maliciously Affected Circuits

Abstract: Research in the field of hardware Trojans has seen significant growth in the past decade. However, standard benchmarks to evaluate hardware Trojans and their detection are lacking. To this end, we have developed a suite of Trojans and 'trust benchmarks' (i.e., benchmark circuits with a hardware Trojan inserted in them) that can be used by researchers in the community to compare and contrast various Trojan detection techniques. In this paper, we present a comprehensive vulnerability analysis flow at various lev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
120
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 250 publications
(121 citation statements)
references
References 36 publications
0
120
0
1
Order By: Relevance
“…Trojans also come in a wide variety of formats so no single filter can catch them all. These Trojans are unwanted and pose a risk to the chip owners of receiving secretly modified hardware that could lead to devastating consequences [1], [2]. A hardware Trojan can be classified into three main categories according to their physical, activation, and action characteristics [1], [2].…”
Section: Background and Experimental Set-up A Hardware Trojan Anmentioning
confidence: 99%
See 3 more Smart Citations
“…Trojans also come in a wide variety of formats so no single filter can catch them all. These Trojans are unwanted and pose a risk to the chip owners of receiving secretly modified hardware that could lead to devastating consequences [1], [2]. A hardware Trojan can be classified into three main categories according to their physical, activation, and action characteristics [1], [2].…”
Section: Background and Experimental Set-up A Hardware Trojan Anmentioning
confidence: 99%
“…While the transition from vertically integrated supply chains to horizontally integrated has decreased costs for integrated circuit (IC) designers; the "fabless" approach comes with the steep price of trust [1], [2], [4]- [6], [8]- [11]. Semiconductor designers now must trust their intellectual property (IP) to multiple parties in order to have their ICs manufactured at foundries [8], [11].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…A good survey of all these methods can be found at [4] and [5]. Most of the work in this area make use of a popular open-source benchmark suite to validate their methods [1], and an extended work of the trust-hub can be found at [2]. The trust-hub [6] contains a variety of designs with Hardware Trojan classified in different domains (i.e., insertion phase, activation mechanism, effect).…”
Section: Introductionmentioning
confidence: 99%