2015 IEEE 33rd VLSI Test Symposium (VTS) 2015
DOI: 10.1109/vts.2015.7116257
|View full text |Cite
|
Sign up to set email alerts
|

Enabling unauthorized RF transmission below noise floor with no detectable impact on primary communication performance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Much attention has been focused on hardware trojan taxonomy, development, and detection in the past two decades, especially since the Defense Science Board of US Department of Defense released a report in 2005 on the security of the supply of highperformance integrated circuits (ICs) which highlighted the need for "secure and authentic hardware" [10]. The resulting research produced numerous publications [11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27] which not only provide insight into existing hardware trojans, but also develop a general framework of hardware trojan understanding. This section will first briefly review hardware trojan taxonomy and detection methods, point out the lack of literature related to analog trojan development, taxonomy, and detection, and then present a number of trojans scenarios that can be possible in the analog/RF domain, specifically attacking a Class-E amplifier in the later sections.…”
Section: Survey Of Hardware Trojansmentioning
confidence: 99%
“…Much attention has been focused on hardware trojan taxonomy, development, and detection in the past two decades, especially since the Defense Science Board of US Department of Defense released a report in 2005 on the security of the supply of highperformance integrated circuits (ICs) which highlighted the need for "secure and authentic hardware" [10]. The resulting research produced numerous publications [11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27] which not only provide insight into existing hardware trojans, but also develop a general framework of hardware trojan understanding. This section will first briefly review hardware trojan taxonomy and detection methods, point out the lack of literature related to analog trojan development, taxonomy, and detection, and then present a number of trojans scenarios that can be possible in the analog/RF domain, specifically attacking a Class-E amplifier in the later sections.…”
Section: Survey Of Hardware Trojansmentioning
confidence: 99%
“…• Triggering mechanism: Most of the previous research work like [27,28,31,32] is based on "always-on" type HT. Hence, there is no dormant stage for previous implementations.…”
Section: Comparison Between Proposed and Existing Hardware Trojan Threat Modelsmentioning
confidence: 99%
“…• Payload: Previous research works were focused on exploiting various properties of RF signals like amplitude, frequency [27][28], and delay spectrum [32]. The proposed HT threat model exploits the ECP properties of OFDM which is a novel exploit method.…”
Section: Comparison Between Proposed and Existing Hardware Trojan Threat Modelsmentioning
confidence: 99%
See 2 more Smart Citations