Case study: Detecting hardware Trojans in third-party digital IP cores

@article{Zhang2011CaseSD,
  title={Case study: Detecting hardware Trojans in third-party digital IP cores},
  author={Xuehui Zhang and Mark Mohammad Tehranipoor},
  journal={2011 IEEE International Symposium on Hardware-Oriented Security and Trust},
  year={2011},
  pages={67-70}
}
The intellectual property (IP) blocks are designed by hundreds of IP vendors distributed across the world. Such IPs cannot be assumed trusted as hardware Trojans can be maliciously inserted into them and could be used in military, financial and other critical applications. It is extremely difficult to detect Trojans in third-party IPs (3PIPs) simply with conventional verification methods as well as methods developed for detecting Trojans in fabricated ICs. This paper first discusses the… CONTINUE READING
Highly Cited
This paper has 138 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 88 extracted citations

138 Citations

02040'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 138 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-5 of 5 references

Trojan detection methodology in pre - silicion designs

  • Banga, Trusted RTL
  • Proc . IEEE Int Symposium on Hardware - Oriented…
  • 2010

Similar Papers

Loading similar papers…