Redesign for untrusted gate-level netlists


This paper proposes a redesign technique which designs from untrusted netlists to trusted netlists. Our approach consists of two phases, detection phase and invalidation phase. The detection phase picks up suspicious hardware Trojans (HTs) by pattern matching. The invalidation phase modifies the suspicious HTs in order not to activate them. In the… (More)
DOI: 10.1109/IOLTS.2016.7604706

3 Figures and Tables


  • Presentations referencing similar topics