HaTCh : A Formal Framework of Hardware Trojan Design and Detection

  title={HaTCh : A Formal Framework of Hardware Trojan Design and Detection},
  author={Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk},
Electronic Design Automation (EDA) industry heavily reuses existing design blocks called IP cores. These IP cores are vulnerable to insertion of Hardware Trojans (HTs) at design time by third party IP core providers or by malicious insiders in the design team. State of the art research has shown that existing trojan detection techniques which claim to detect all publicly available HT benchmarks, can still be defeated by carefully designing new sophisticated trojans. Researchers have proposed… CONTINUE READING


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 28 references


  • M. Tehranipoor, R. Karri, F. Koushanfar, M. Potkonjak
  • http://trust-hub.org.
Highly Influential
15 Excerpts

Similar Papers

Loading similar papers…