A hardened network-on-chip design using runtime hardware Trojan mitigation methods

@article{Frey2017AHN,
  title={A hardened network-on-chip design using runtime hardware Trojan mitigation methods},
  author={Jonathan Frey and Qiaoyan Yu},
  journal={Integration},
  year={2017},
  volume={56},
  pages={15-31}
}
Due to the globalized semiconductor business model, malicious hardware modifications, known as hardware Trojans (HTs), have risen up as a big concern for chip security. HT detection and mitigation methods for general integrated circuits have been investigated in the past decade. However, the majority of the existing efforts are not customized for HTs in… CONTINUE READING