2021
DOI: 10.1109/tcad.2020.3035346
|View full text |Cite
|
Sign up to set email alerts
|

On-Chip Trust Evaluation Utilizing TDC-Based Parameter-Adjustable Security Primitive

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…Similarly, for FPGA research, Ma et al. [ 50 ] proposed an on-chip security framework that can be used to verify whether an HT has tampered with or corrupted the original design. Mohd et al.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, for FPGA research, Ma et al. [ 50 ] proposed an on-chip security framework that can be used to verify whether an HT has tampered with or corrupted the original design. Mohd et al.…”
Section: Related Workmentioning
confidence: 99%
“…Cho et al [49] proposed a bidirectional mechanism to detect hardware Trojans in FPGAs at any stage in order to efficiently detect them. Similarly, for FPGA research, Ma et al [50] proposed an on-chip security framework that can be used to verify whether an HT has tampered with or corrupted the original design. Mohd et al [51] implemented a run-time monitoring design for lightweight ciphers in RCDs on an FPGA platform.…”
Section: Detection and Prevention For Specific Chipsmentioning
confidence: 99%
“…ime-to-digital converters (TDCs) are simply high-precision time-interval meters, converting a time interval (TI) into a digital code. (R2, comment 1) They are widely used in industrial and scientific applications, including light detection and ranging (LiDAR) for automatic vehicles and robotics [1]- [3], 3-D imaging [4]- [6], surveying [7], Raman spectroscopy [8], [9], hardware trojan detection [10], temperature sensing [11], [12], random number generation [13], [14], particle physics [15]- [17], positron emission tomography (PET) [18], fluorescence lifetime imaging microscopy (FLIM) [19] and space sciences [20].…”
Section: Introductionmentioning
confidence: 99%
“…At the meantime, the security of the IoT has attracted the attention of research. As the embedded core of IoT, it is vulnerable to hardware Trojan [1] , [2] , [3] , [4] , [5] , [6] , [7] , [8] , [9] , [10] , [11] , [12] , [13] and code tamper attacks [14] , [15] , [16] , which could have serious consequences, including functional changes, denial of service (DoS), information leakage, and even system crashes. Thus, the security issue of embedded processor becomes extremely prominent, the recovery mechanism after attack detection is an important scheme to guarantee the security of embedded processor.…”
Section: Introductionmentioning
confidence: 99%