Proceedings of the ACM Asia Conference on Computer and Communications Security 2023
DOI: 10.1145/3579856.3582837
|View full text |Cite
|
Sign up to set email alerts
|

T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing

Abstract: Since the inception of the Integrated Circuit (IC), the size of the transistors used to construct them has continually shrunk. While this advancement significantly improves computing capability, fabrication costs have skyrocketed. As a result, most IC designers must now outsource fabrication. Outsourcing, however, presents a security threat: comprehensive post-fabrication inspection is infeasible given the size of modern ICs, so it is nearly impossible to know if the foundry has altered the original design dur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 53 publications
(185 reference statements)
0
0
0
Order By: Relevance