2014 Ninth International Conference on Availability, Reliability and Security 2014
DOI: 10.1109/ares.2014.45
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Hardware Trojan Detection Cycle

Abstract: Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality. However, these detection and prevention mechanisms are still hardly integrated in the industry's Hardware development life cycles. We therefore propose in this work a secure hardware development life cycle that assembles methods from tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…A process of secure development and rigorous testing at each production stage, such as the one proposed in [6], can reveal manipulations before fabrication.…”
Section: Introductionmentioning
confidence: 99%
“…A process of secure development and rigorous testing at each production stage, such as the one proposed in [6], can reveal manipulations before fabrication.…”
Section: Introductionmentioning
confidence: 99%
“…The strategy σ D3 (STRC) is a structural pattern matching method similar to those in [49,50]. It claims a Trojan is present whenever it detects disconnected or undriven wires or asynchronous feedback loops, features common in published HTHs and extremely uncommon in traditional circuit design.…”
Section: Defender Strategiesmentioning
confidence: 99%