2015
DOI: 10.1109/tcad.2015.2424929
|View full text |Cite
|
Sign up to set email alerts
|

Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans

Abstract: The hardware Trojan threat has motivated development of Trojan detection schemes at all stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on ICs at test-time, there are many unique advantages offered by post-deployment/run-time Trojan detection. However, run-time approaches have been underutilized with prior work highlighting the challenges of implementing them with limited hardware resources. In this paper, we propose three innovative low-overhead approaches for run… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 69 publications
(22 citation statements)
references
References 35 publications
0
22
0
Order By: Relevance
“…3) Embedding sensors in the circuit or chip capable of detecting Trojans by measuring temperature variations. This method was employed in [4]. 4) Another method revolves around the comparison of instantaneous voltage and current [12]; however, that study did not report the numerical result of success rate or overhead.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…3) Embedding sensors in the circuit or chip capable of detecting Trojans by measuring temperature variations. This method was employed in [4]. 4) Another method revolves around the comparison of instantaneous voltage and current [12]; however, that study did not report the numerical result of success rate or overhead.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Trojans may activate in specific working or environmental circumstances, leaving destructive effects such as piracy and illegal data transfer [1][2][3]. Trojan detection takes place in 3 phases during the lifecycle of a chip: during design time, test time, and run time [4]. Design-time methods usually support the run-time methods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…[11][12][13] Operating principle of it is that HTs implanted in the chip will affect some side-channel signal of the chip. as current, delay time, and temperature to detect HT under working condition.…”
Section: Of 10mentioning
confidence: 99%
“…as current, delay time, and temperature to detect HT under working condition. [11][12][13] Operating principle of it is that HTs implanted in the chip will affect some side-channel signal of the chip. According to this, we can detect HTs by observing side-channel signal of the chip and comparing it with the original chip.…”
Section: Of 10mentioning
confidence: 99%