2016
DOI: 10.1109/tcad.2015.2488495
|View full text |Cite
|
Sign up to set email alerts
|

On Reverse Engineering-Based Hardware Trojan Detection

Abstract: Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits, also known as hardware Trojans, has attracted attention in academia as well as industry. To reduce the risks associated with Trojans, researchers have proposed different approaches to detect them. Among these approaches, test-time detection approaches have drawn the greatest attention. Many test-time approaches assume the existence of a Trojan-free chip/model also known as "golden model". Prio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
44
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 135 publications
(45 citation statements)
references
References 20 publications
1
44
0
Order By: Relevance
“…Therefore, the geochemical and competitive removal behavior of coexisting As and Sb under heterogeneous aqueous environment is worth understanding. Many researchers [30][31][32] have investigated the simultaneous removal performance of As and Sb in the multicomponent environment. The factors, such as pH, coagulant type and dosage, initial contaminant levels and NOM, affect the As or Sb adsorption onto the surface of Fe minerals [33,34].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the geochemical and competitive removal behavior of coexisting As and Sb under heterogeneous aqueous environment is worth understanding. Many researchers [30][31][32] have investigated the simultaneous removal performance of As and Sb in the multicomponent environment. The factors, such as pH, coagulant type and dosage, initial contaminant levels and NOM, affect the As or Sb adsorption onto the surface of Fe minerals [33,34].…”
Section: Introductionmentioning
confidence: 99%
“…Currently, most of the researches on hardware-Trojan detection methods are reverse engineering, 10,11 logic testing, [12][13][14] and side-channel signal analysis, [15][16][17][18] which called post-silicon detection methods. However, due to the difficulty of the acquisition of golden chips, influenced by noise easily, high cost, the requirement of special equipment, and other reasons, the post-silicon detection methods are not effective in practical applications.…”
Section: Introductionmentioning
confidence: 99%
“…To defeat HTs and prevent HT-infected chips from being supplied to the market, researchers have proposed various HT detection techniques over the past decade [1], [2]. Benefiting from the development of training algorithms and computational power, very recent research shows a new trend in adopting machine learning (ML) approaches for HT detection [3], [4].…”
Section: Introductionmentioning
confidence: 99%