2012 IEEE International Symposium on Hardware-Oriented Security and Trust 2012
DOI: 10.1109/hst.2012.6224324
|View full text |Cite
|
Sign up to set email alerts
|

Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…Specifically, we do not address the case of HTcaused information leakage via a side-channel such as energy consumption. A variety of approaches address HT-induced by side-channel leakage has been published in a recent survey paper; see Bhunia et al [4] and others [11][12].…”
Section: Relationship To Other Threat Scenariosmentioning
confidence: 99%
“…Specifically, we do not address the case of HTcaused information leakage via a side-channel such as energy consumption. A variety of approaches address HT-induced by side-channel leakage has been published in a recent survey paper; see Bhunia et al [4] and others [11][12].…”
Section: Relationship To Other Threat Scenariosmentioning
confidence: 99%
“…In [27], a transparent mode is introduced in a design with a FSM to enhance the controllability and observability of internal nodes. Researchers have also shown that high-precision delay structure or current sensing circuit can be embedded into a design to improve HT detectability [28], [29]. Functional filler cells are inserted into unused space to prevent HT insertion [30].…”
Section: A Related Workmentioning
confidence: 99%
“…Several techniques recommended designfor-hardware-trust aimed to magnify Trojan impact during authentication [7][8] [9]. Further, several side-channel-based techniques have been introduced to distinguish the contribution of Trojans from the impact of process variations in a circuit [10] [11][12] [13]. Hardware Trojan design and implementation were presented in [14][15] [16] [17].…”
Section: Introductionmentioning
confidence: 99%