TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits

@article{Wu2016TPADHT,
  title={TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits},
  author={T. Wu and K. Ganesan and Y. Hu and H. P. Wong and S. Wong and S. Mitra},
  journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},
  year={2016},
  volume={35},
  pages={521-534}
}
  • T. Wu, K. Ganesan, +3 authors S. Mitra
  • Published 2016
  • Engineering, Computer Science
  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  • There are increasing concerns about possible malicious modifications of integrated circuits (ICs) used in critical applications. Such attacks are often referred to as hardware Trojans. While many techniques focus on hardware Trojan detection during IC testing, it is still possible for attacks to go undetected. Using a combination of new design techniques and new memory technologies, we present a new approach that detects a wide variety of hardware Trojans during IC testing and also during… CONTINUE READING
    65 Citations
    Novel Design Strategy Toward A2 Trojan Detection Based on Built-In Acceleration Structure
    • D. Deng, Yaohua Wang, Yang Guo
    • Computer Science
    • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
    • 2020
    • 4
    Hardware Trojan Prevention Through Limiting Access to the Active Region
    Transition probabilistic approach for detection and diagnosis of Hardware Trojan in combinational circuits
    • 3
    • Highly Influenced
    Test Pattern Superposition to Detect Hardware Trojans
    • Chris Nigh, A. Orailoglu
    • Computer Science
    • 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
    • 2020
    • 1
    Programmable assertion checkers for hardware Trojan detection
    • 1

    References

    SHOWING 1-10 OF 128 REFERENCES
    Stealthy dopant-level hardware Trojans: extended version
    • 55
    • PDF
    TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection
    • 107
    • PDF
    Hardware Trojan horse detection using gate-level characterization
    • 227
    • PDF
    At-speed delay characterization for IC authentication and Trojan Horse detection
    • J. Li, J. Lach
    • Engineering, Computer Science
    • 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
    • 2008
    • 282
    • PDF
    Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps
    • 69
    • PDF
    A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
    • 210
    • PDF
    Malicious circuitry detection using fast timing characterization via test points
    • S. Wei, M. Potkonjak
    • Engineering, Computer Science
    • 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
    • 2013
    • 11
    • PDF
    Hardware Trojan detection for gate-level ICs using signal correlation based clustering
    • Burçin Çakir, S. Malik
    • Engineering, Computer Science
    • 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE)
    • 2015
    • 47
    • PDF
    High-sensitivity hardware Trojan detection using multimodal characterization
    • 61
    • PDF
    Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    • 57
    • PDF