2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS) 2017
DOI: 10.1109/inis.2017.30
|View full text |Cite
|
Sign up to set email alerts
|

Neutralization of the Effect of Hardware Trojan in SCADA System Using Selectively Placed TMR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…There are two main advantages in comparison with other neutralization techniques that use TMR ( [4] and [5]): resource savings and the use of approximations itself. On the one hand, the area reduction achieved with this technique can suppose an important cost-saving in complex circuits and makes easier to detect HTs by using side-channel techniques.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…There are two main advantages in comparison with other neutralization techniques that use TMR ( [4] and [5]): resource savings and the use of approximations itself. On the one hand, the area reduction achieved with this technique can suppose an important cost-saving in complex circuits and makes easier to detect HTs by using side-channel techniques.…”
Section: Discussionmentioning
confidence: 99%
“…The use of TMR to thwart HT insertion has been proposed in [10], [4], [5] by N. Gunti et al In such a TMR based method, an HT has to be introduced in at least two copies in order not to be blocked by the majority voter. Authors claim that such duplication of a potential HT makes it relatively big, therefore also relatively easy to detect through side-channel based techniques.…”
Section: B Ht Prevention Methods Based On Redundancymentioning
confidence: 99%
See 2 more Smart Citations