2015
DOI: 10.1016/j.micpro.2015.02.002
|View full text |Cite
|
Sign up to set email alerts
|

Improving hardware Trojan detection by retiming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…From these results, it is clear that the HTH imposes a negligible impact on every measurable circuit parameter. The HTHs do not show any impact on delay, even the latest reported delay based trojan detection methodology [24,25] fails in this case.…”
Section: Results Of Remote Attack On Trng Using Amentioning
confidence: 82%
“…From these results, it is clear that the HTH imposes a negligible impact on every measurable circuit parameter. The HTHs do not show any impact on delay, even the latest reported delay based trojan detection methodology [24,25] fails in this case.…”
Section: Results Of Remote Attack On Trng Using Amentioning
confidence: 82%
“…The results showed that this method improves the detection of HTs with low area overhead. The same group in the study [134], developed a path-delay fingerprinting-based method for the Institutional Repository -Library & Information Centre -University of Thessaly 13/03/2023 02:37:47 EET -44.224.250.200 detection of HTs. Specifically, they developed a logic-level synthesis retiming algorithm that shortened for each node of a circuit the connection paths to minimize the communication delay.…”
Section: Variant-based Parallel Executionmentioning
confidence: 99%