2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) 2014
DOI: 10.1109/dft.2014.6962105
|View full text |Cite
|
Sign up to set email alerts
|

Triggering Trojans in SRAM circuits with X-propagation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…A variety of disciplines track the movement of data through hardware designs in order to make important design decisions. For example, information flow tracking (IFT) monitors the propagation of security critical information to determine compliance to security properties [2-4, 8, 14]; X-propagation aims to understand how nondeterministic values originating from uninitialized registers influence reliability and where they could possibly flow to [1,5,6,10,13]; and fault propagation models the effect of faulty values on system reliability [7,11,16] and susceptibility to implementation attacks [9,15].…”
Section: Introductionmentioning
confidence: 99%
“…A variety of disciplines track the movement of data through hardware designs in order to make important design decisions. For example, information flow tracking (IFT) monitors the propagation of security critical information to determine compliance to security properties [2-4, 8, 14]; X-propagation aims to understand how nondeterministic values originating from uninitialized registers influence reliability and where they could possibly flow to [1,5,6,10,13]; and fault propagation models the effect of faulty values on system reliability [7,11,16] and susceptibility to implementation attacks [9,15].…”
Section: Introductionmentioning
confidence: 99%