2016
DOI: 10.1109/tcad.2015.2459038
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules

Abstract: During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This paper describes a technique for identifying hardware Trojans with logic-based payloads that are hidden within third-party intellectual property. Through comparison of two similar but untrusted designs, functional differences can be identified for all pos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…The focus of our work differs from [32], as we investigate design-fortrust techniques to determine the configuration of the MPSoC system that meets the performance requirements and reduce energy. To reduce the runtime cost, Reece et al proposed a technique for identifying hardware trojans with logic-based payloads at design time [33]. However, it cannot be applied to large circuits due to the limited software capacity [13].…”
Section: A Trojans Detection In 3pipsmentioning
confidence: 99%
“…The focus of our work differs from [32], as we investigate design-fortrust techniques to determine the configuration of the MPSoC system that meets the performance requirements and reduce energy. To reduce the runtime cost, Reece et al proposed a technique for identifying hardware trojans with logic-based payloads at design time [33]. However, it cannot be applied to large circuits due to the limited software capacity [13].…”
Section: A Trojans Detection In 3pipsmentioning
confidence: 99%
“…Significant research efforts have been undertaken to detect such security threats. There are several proposed solutions related to digital systems [10]. However, for the cryptography systems utilizing analog chaotic circuits the security issues are still open [6].…”
Section: Hardware Trojansmentioning
confidence: 99%
“…As discussed in [6][7][8][9][10], the security issues and protection against HTs is a key problem in modern electronics and computer engineering. In this paper we discuss HTs that may easily be implemented and integrated with the PCB modules in chaotic analog generators.…”
mentioning
confidence: 99%