Case study: Detecting hardware Trojans in third-party digital IP cores

  title={Case study: Detecting hardware Trojans in third-party digital IP cores},
  author={Xuehui Zhang and Mark Mohammad Tehranipoor},
  journal={2011 IEEE International Symposium on Hardware-Oriented Security and Trust},
The intellectual property (IP) blocks are designed by hundreds of IP vendors distributed across the world. Such IPs cannot be assumed trusted as hardware Trojans can be maliciously inserted into them and could be used in military, financial and other critical applications. It is extremely difficult to detect Trojans in third-party IPs (3PIPs) simply with conventional verification methods as well as methods developed for detecting Trojans in fabricated ICs. This paper first discusses the… CONTINUE READING
Highly Cited
This paper has 138 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 88 extracted citations

138 Citations

Citations per Year
Semantic Scholar estimates that this publication has 138 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-5 of 5 references

Trojan detection methodology in pre - silicion designs

  • Banga, Trusted RTL
  • Proc . IEEE Int Symposium on Hardware - Oriented…
  • 2010

Similar Papers

Loading similar papers…