2017
DOI: 10.1016/j.vlsi.2017.06.002
|View full text |Cite
|
Sign up to set email alerts
|

Effective usage of redundancy to aid neutralization of hardware Trojans in Integrated Circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…The possibility of this kind of behaviour, along with the fact that Trojans are stealthy make it difficult to conjure effective Trojan detection schemes. To counter such situations, the current focus of researchers is to neutralize them apart from detecting the Trojans (Gunti and Lingasubramanian, 2017).…”
Section: Effect Of the Triggered Trojansmentioning
confidence: 99%
“…The possibility of this kind of behaviour, along with the fact that Trojans are stealthy make it difficult to conjure effective Trojan detection schemes. To counter such situations, the current focus of researchers is to neutralize them apart from detecting the Trojans (Gunti and Lingasubramanian, 2017).…”
Section: Effect Of the Triggered Trojansmentioning
confidence: 99%
“…The possibility of this kind of behavior, along with the fact that Trojans are stealthy make it difficult to conjure effective Trojan detection schemes. To counter such situations, the current focus of researchers is to neutralize them apart from detecting the Trojans (Gunti & Lingasubramanian, 2017).…”
Section: Performance Degradationmentioning
confidence: 99%
“…The use of DMR and TMR to thwart HTs has been introduced in [3], [4], [5]. However, straightforward replication is not considered as an obstacle to insert an HT in these ICs.…”
Section: Introductionmentioning
confidence: 99%