Redesign for untrusted gate-level netlists

Abstract

This paper proposes a redesign technique which designs from untrusted netlists to trusted netlists. Our approach consists of two phases, detection phase and invalidation phase. The detection phase picks up suspicious hardware Trojans (HTs) by pattern matching. The invalidation phase modifies the suspicious HTs in order not to activate them. In the… (More)
DOI: 10.1109/IOLTS.2016.7604706

3 Figures and Tables

Topics

  • Presentations referencing similar topics