Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach

@article{Narasimhan2010MultipleparameterSA,
  title={Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach},
  author={Seetharam Narasimhan and Rajat Subhra Chakraborty and Dongdong Du and Somnath Paul and Francis G. Wolff and Christos A. Papachristou and Kaushik Roy and Swarup Bhunia},
  journal={2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)},
  year={2010},
  pages={13-18}
}
Malicious alterations of integrated circuits during fabrication in untrusted foundries pose major concern in terms of their reliable and trusted field operation. It is extremely difficult to discover such alterations, also referred to as “hardware Trojans” using conventional structural or functional testing strategies. In this paper, we propose a novel non-invasive, multiple-parameter side-channel analysis based Trojan detection approach that is capable of detecting malicious hardware… CONTINUE READING
Highly Cited
This paper has 107 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 74 extracted citations

On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis

Information Security Journal: A Global Perspective • 2013
View 4 Excerpts
Highly Influenced

Detection of Malicious Circuit in Hardware using Compressive Sensing Algorithm

2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC) • 2018
View 2 Excerpts

Using Physical and Functional Comparisons to Assure 3rd-Party IP for Modern FPGAs

2018 IEEE 3rd International Verification and Security Workshop (IVSW) • 2018
View 1 Excerpt

A Novel Test Pattern Optimization Approach Based on Ring Oscillator Network

2017 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC) • 2017
View 1 Excerpt

107 Citations

01020'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 107 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 10 references

Performance of delay-based Trojan detection techniques under parameter variations

2009 IEEE International Workshop on Hardware-Oriented Security and Trust • 2009
View 1 Excerpt

A region based approach for the identification of hardware Trojans

2008 IEEE International Workshop on Hardware-Oriented Security and Trust • 2008

Hardware Trojan detection using path delay fingerprint

2008 IEEE International Workshop on Hardware-Oriented Security and Trust • 2008
View 1 Excerpt

Trojan Detection using IC Fingerprinting

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 2 Excerpts

Similar Papers

Loading similar papers…