Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

@article{Narasimhan2013HardwareTD,
  title={Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis},
  author={Seetharam Narasimhan and Dongdong Du and Rajat Subhra Chakraborty and Somnath Paul and Francis G. Wolff and Christos A. Papachristou and Kaushik Roy and Swarup Bhunia},
  journal={IEEE Transactions on Computers},
  year={2013},
  volume={62},
  pages={2183-2195}
}
Hardware Trojan attack in the form of malicious modification of a design has emerged as a major security threat. Sidechannel analysis has been investigated as an alternative to conventional logic testing to detect the presence of hardware Trojans. However, these techniques suffer from decreased sensitivity toward small Trojans, especially because of the large process variations present in modern nanometer technologies. In this paper, we propose a novel noninvasive, multiple-parameter side… CONTINUE READING
Highly Cited
This paper has 133 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 63 extracted citations

MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection

ACM Conference on Computer and Communications Security • 2016
View 5 Excerpts
Highly Influenced

Watermarking in Hard Intellectual Property for Pre-Fab and Post-Fab Verification

IEEE Transactions on Very Large Scale Integration (VLSI) Systems • 2015
View 4 Excerpts
Highly Influenced

Property Specific Information Flow Analysis for Hardware Security Verification

2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) • 2018
View 6 Excerpts
Highly Influenced

Hardware Trojan detection based on correlated path delays in defiance of variations with spatial correlations

Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 • 2017
View 4 Excerpts
Highly Influenced

Classification of hardware trojan detection techniques

2015 Tenth International Conference on Computer Engineering & Systems (ICCES) • 2015
View 4 Excerpts
Method Support
Highly Influenced

A novel hardware Trojan design based on one-hot code

2018 6th International Symposium on Digital Forensic and Security (ISDFS) • 2018

Detection of Sequential Trojans in Embedded System Designs Without Scan Chains

2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) • 2018
View 1 Excerpt

134 Citations

02040'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 134 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 33 references

A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits

2010 IEEE International Workshop on Information Forensics and Security • 2010
View 4 Excerpts
Highly Influenced

A region based approach for the identification of hardware Trojans

2008 IEEE International Workshop on Hardware-Oriented Security and Trust • 2008
View 16 Excerpts
Highly Influenced

Trojan Detection using IC Fingerprinting

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 17 Excerpts
Highly Influenced

Toward Trusted Hardware: Identifying and Classifying Hardware Trojans

R. Karri, J. Rajendran, K. Rosenfeld, M. Tehranipoor
Computer, vol. 44, no. 7, pp. 66-74, 2011. • 2011
View 1 Excerpt