Proceedings of the 46th Annual Design Automation Conference 2009
DOI: 10.1145/1629911.1630091
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan horse detection using gate-level characterization

Abstract: Hardware Trojan horses (HTHs) are the malicious altering of hardware specification or implementation in such a way that its functionality is altered under a set of conditions defined by the attacker. There are numerous HTHs sources including untrusted foundries, synthesis tools and libraries, testing and verification tools, and configuration scripts. HTH attacks can greatly comprise security and privacy of hardware users either directly or through interaction with pertinent systems and application software or … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
89
0
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 196 publications
(90 citation statements)
references
References 15 publications
0
89
0
1
Order By: Relevance
“…It also easily explains the discrepancy of any global measurement as a consequence of the embedded HT. Recently, a significant progress has been made in the field of HT detection using gate-level characterization techniques where a large set of global measurements is used to calculate variation-dependent characteristics of each gate post-silicon [14,17,18,19,20,22]. Therefore, the variability aspects of PV are now addressed well.…”
Section: Process Variationmentioning
confidence: 99%
“…It also easily explains the discrepancy of any global measurement as a consequence of the embedded HT. Recently, a significant progress has been made in the field of HT detection using gate-level characterization techniques where a large set of global measurements is used to calculate variation-dependent characteristics of each gate post-silicon [14,17,18,19,20,22]. Therefore, the variability aspects of PV are now addressed well.…”
Section: Process Variationmentioning
confidence: 99%
“…Li and Lach propose adding on chip delay test structures for Trojan detection [27]. Gate-level characterization was used for postsilicon profiling [28]- [30] and its use for IC Trojan detection was first proposed in [9], [31] and also used in [10]- [13], [32], [33]. However, optimality guarantees (bounds), calibration, sensitivity, and multimodal combining were not discussed in the literature.…”
Section: Related Workmentioning
confidence: 99%
“…Using the timing signal signature by testing multiple path signatures was suggested [8]. Gate level characterization for Trojan detection was proposed [9]- [13] but no systematic formal analysis or optimal algorithms were discussed. The available methods are either based on ad-hoc measurements, heuristics for detection, calibration and test, or they use costly and slow destructive tests.…”
Section: Introductionmentioning
confidence: 99%
“…Li and Lach propose adding on chip delay test structures for Trojan detection [16]. Gate level characterization for noninvasive post-silicon IC profiling [12] and for Trojan detection was used in [20,22,2,28]. However, the previous work did not provide a systematic algorithm with any kind of optimality, nor they addressed calibration, sensitivity, or multimodal combining.…”
Section: Related Workmentioning
confidence: 99%