2013
DOI: 10.1007/978-3-642-40349-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Stealthy Dopant-Level Hardware Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
157
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 207 publications
(158 citation statements)
references
References 16 publications
1
157
0
Order By: Relevance
“…Becker et al proposed a new hardware trojan at CHES 2013 [1]. Their idea is to make a trojan just by modifying dopant types in active region.…”
Section: Stealthy Dopant-level Trojansmentioning
confidence: 99%
See 2 more Smart Citations
“…Becker et al proposed a new hardware trojan at CHES 2013 [1]. Their idea is to make a trojan just by modifying dopant types in active region.…”
Section: Stealthy Dopant-level Trojansmentioning
confidence: 99%
“…The exposed layers are measured with an imager e.g., SEM. Secondly, the images are compared with golden images for a possible difference [1]. Becker et al assume that distinguishing dopant types in such images is difficult.…”
Section: Stealthy Dopant-level Trojansmentioning
confidence: 99%
See 1 more Smart Citation
“…A very recent Trojan insertion technique by a hard-todetect manipulation of p-type and n-type dopants in transistors of a circuit [13] received broad public interest. It manipulated a random number generator circuit that is part of an Intel processor such that the quality of random numbers was no longer sufficient for secure applications while escaping detection.…”
Section: Hardware Trojansmentioning
confidence: 99%
“…Moreover, it is the very nature of BIST blocks being deterministic and disconnected from the outside works that simplifies their manipulation. For example, the above-mentioned dopant Trojan [13] was able to circumvent two levels of protection by BIST mechanisms employed in the Intel processor with the objective to avoid DFT.…”
Section: Hardware Security Versus Dft and Bistmentioning
confidence: 99%