Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection

  title={Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection},
  author={Hassan Salmani and Mark Mohammad Tehranipoor},
  journal={IEEE Transactions on Information Forensics and Security},
Government agencies and the semiconductor industry have raised serious concerns about malicious modifications to the integrated circuits. The added functionality known as hardware Trojan poses major detection and isolation challenges. This paper presents a new hardware trust architecture to magnify functional Trojans activity. Trojan detection resolution depends on Trojan activity directly and circuit activity reversely. The proposed architecture reorders scan cells based on their placement… CONTINUE READING
Highly Cited
This paper has 45 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 30 extracted citations

Cost-efficient Acceleration of Hardware Trojan Detection Through Fan-Out Cone Analysis and Weighted Random Pattern Technique

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems • 2016
View 4 Excerpts
Highly Influenced

Scalable Test Generation for Trojan Detection Using Side Channel Analysis

IEEE Transactions on Information Forensics and Security • 2018
View 3 Excerpts

Self Aware SoC Security to Counteract Delay Inducing Hardware Trojans at Runtime

2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID) • 2017
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 31 references

Taxonomy of trojans and methods of detection for IC trust,

R. Rad, X. Wang, J. Plusquellic, M. Tehranipoor
in Proc. Int. Conf. Computer-Aided Design (ICCAD08), • 2008
View 5 Excerpts
Highly Influenced

Trojan Detection using IC Fingerprinting

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 6 Excerpts
Highly Influenced

Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach

2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) • 2010
View 2 Excerpts

A Novel Sustained Vector Technique for the Detection of Hardware Trojans

2009 22nd International Conference on VLSI Design • 2009
View 3 Excerpts

Consistency-based characterization for IC Trojan detection

2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers • 2009
View 1 Excerpt

Similar Papers

Loading similar papers…