A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time

@article{Salmani2012ANT,
  title={A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time},
  author={Hassan Salmani and Mark Mohammad Tehranipoor and James F. Plusquellic},
  journal={IEEE Transactions on Very Large Scale Integration (VLSI) Systems},
  year={2012},
  volume={20},
  pages={112-125}
}
Fabless semiconductor industry and government agencies have raised serious concerns about tampering with inserting hardware Trojans in an integrated circuit supply chain in recent years. Most of the recently proposed Trojan detection methods are based on Trojan activation to observe either a faulty output or measurable abnormality on side-channel signals. Time to activate a hardware Trojan circuit is a major concern from the authentication standpoint. This paper analyzes time to generate a… CONTINUE READING
Highly Influential
This paper has highly influenced 13 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 127 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 91 extracted citations

Potential Trigger Detection for Hardware Trojans

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems • 2018
View 8 Excerpts
Highly Influenced

A survey of hardware Trojan threat and defense

Integration • 2016
View 5 Excerpts
Highly Influenced

Cost-efficient Acceleration of Hardware Trojan Detection Through Fan-Out Cone Analysis and Weighted Random Pattern Technique

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems • 2016
View 10 Excerpts
Highly Influenced

Testability Based Metric for Hardware Trojan Vulnerability Assessment

2016 Euromicro Conference on Digital System Design (DSD) • 2016
View 8 Excerpts
Highly Influenced

A low cost acceleration method for hardware trojan detection based on fan-out cone analysis

2014 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) • 2014
View 10 Excerpts
Highly Influenced

A novel technique for defending hardware Trojan circuit

2014 IEEE International Conference on Communiction Problem-solving • 2014
View 6 Excerpts
Highly Influenced

Hardware Trojan detection acceleration based on word-level statistical properties management

2014 International Conference on Field-Programmable Technology (FPT) • 2014
View 5 Excerpts
Highly Influenced

Neutralizing a design-for-hardware-trust technique

The 17th CSI International Symposium on Computer Architecture & Digital Systems (CADS 2013) • 2013
View 7 Excerpts
Highly Influenced

127 Citations

0102030'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 127 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 21 references

Trojan Detection using IC Fingerprinting

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 4 Excerpts
Highly Influenced

A survey of hardware Trojan taxonomy and detection

J. Lach
IEEE Des . Test Comput . • 2010

A Novel Sustained Vector Technique for the Detection of Hardware Trojans

2009 22nd International Conference on VLSI Design • 2009
View 2 Excerpts

Consistency-based characterization for IC Trojan detection

2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers • 2009
View 1 Excerpt

Security against hardware Trojan through a novel application of design obfuscation

2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers • 2009
View 2 Excerpts

A region based approach for the identification of hardware Trojans

2008 IEEE International Workshop on Hardware-Oriented Security and Trust • 2008
View 2 Excerpts

At-speed delay characterization for IC authentication and Trojan Horse detection

2008 IEEE International Workshop on Hardware-Oriented Security and Trust • 2008
View 1 Excerpt

Similar Papers

Loading similar papers…