Proceedings of the 18th ACM International Conference on Computing Frontiers 2021
DOI: 10.1145/3457388.3458869
|View full text |Cite
|
Sign up to set email alerts
|

Tapeout of a RISC-V crypto chip with hardware trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…Functional HTs aim to include circuitry into the layout with minimal power overhead and a low area footprint compared to the original device. Examples have been demonstrated in [1], [11], [9], or [7]. These flows typically rely on an engineering change order (ECO) flow.…”
Section: A Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Functional HTs aim to include circuitry into the layout with minimal power overhead and a low area footprint compared to the original device. Examples have been demonstrated in [1], [11], [9], or [7]. These flows typically rely on an engineering change order (ECO) flow.…”
Section: A Related Workmentioning
confidence: 99%
“…The uniqueness and reliability of silicon measurements in [20] have been assessed. The schematic and the layout implementation of an SRAM cell via the Skywater130 HD 1,2 open-source process design kit (PDK) is shown in Fig. 3.…”
Section: B Modified Sram Power-up Simulationmentioning
confidence: 99%
See 2 more Smart Citations
“…The fact that it could only be triggered under specific trigger conditions makes these modifications hard to detect. These modifications can be inserted into the SoC by changing the source code during the design phase [1], by using CAD tools during the silicon-synthesis phase [2], or by changing the masks during the tape-out process [3].…”
Section: Introductionmentioning
confidence: 99%