2016
DOI: 10.1109/tmscs.2016.2584052
|View full text |Cite
|
Sign up to set email alerts
|

Design and Validation for FPGA Trust under Hardware Trojan Attacks

Abstract: Field programmable gate arrays (FPGAs) are being increasingly used in a wide range of critical applications including industrial, automotive, medical, and military systems. Since FPGA vendors are typically fabless, it is more economical to outsource device production to off-shore facilities. This introduces many opportunities for the insertion of malicious alterations of FPGA Devices in the foundry, referred to as hardware Trojan attacks, that can cause logical and physical malfunctions during field operation.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 49 publications
(15 citation statements)
references
References 29 publications
(40 reference statements)
0
15
0
Order By: Relevance
“…In case of a mismatch, the correct result is determined by the voter. TMR impacts performance and increases area, power, and energy 9 . Also, TMR might fail if a HT is embedded in the voter circuit 9 …”
Section: Literature Reviewmentioning
confidence: 99%
See 4 more Smart Citations
“…In case of a mismatch, the correct result is determined by the voter. TMR impacts performance and increases area, power, and energy 9 . Also, TMR might fail if a HT is embedded in the voter circuit 9 …”
Section: Literature Reviewmentioning
confidence: 99%
“…TMR impacts performance and increases area, power, and energy 9 . Also, TMR might fail if a HT is embedded in the voter circuit 9 …”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations