TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits
@article{Wu2016TPADHT, title={TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits}, author={T. Wu and K. Ganesan and Y. Hu and H. P. Wong and S. Wong and S. Mitra}, journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems}, year={2016}, volume={35}, pages={521-534} }
There are increasing concerns about possible malicious modifications of integrated circuits (ICs) used in critical applications. Such attacks are often referred to as hardware Trojans. While many techniques focus on hardware Trojan detection during IC testing, it is still possible for attacks to go undetected. Using a combination of new design techniques and new memory technologies, we present a new approach that detects a wide variety of hardware Trojans during IC testing and also during… CONTINUE READING
Figures, Tables, and Topics from this paper
65 Citations
Novel Design Strategy Toward A2 Trojan Detection Based on Built-In Acceleration Structure
- Computer Science
- IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- 2020
- 4
Hardware Trojan Prevention Through Limiting Access to the Active Region
- Computer Science
- 2019 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)
- 2019
Transition probabilistic approach for detection and diagnosis of Hardware Trojan in combinational circuits
- Engineering
- 2016 IEEE Annual India Conference (INDICON)
- 2016
- 3
- Highly Influenced
Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures
- Computer Science
- J. Hardw. Syst. Secur.
- 2018
- 3
A Unified Approach to Detect and Distinguish Hardware Trojans and Faults in SRAM-based FPGAs
- Computer Science
- J. Electron. Test.
- 2019
- 3
Hardware Trojan Detection Leveraging a Novel Golden Layout Model Towards Practical Applications
- Computer Science
- J. Electron. Test.
- 2019
- 1
- PDF
Test Pattern Superposition to Detect Hardware Trojans
- Computer Science
- 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
- 2020
- 1
Programmable assertion checkers for hardware Trojan detection
- Engineering
- 2017 1st Conference on PhD Research in Microelectronics and Electronics Latin America (PRIME-LA)
- 2017
- 1
References
SHOWING 1-10 OF 128 REFERENCES
Stealthy dopant-level hardware Trojans: extended version
- Computer Science
- Journal of Cryptographic Engineering
- 2013
- 55
- PDF
TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection
- Engineering, Computer Science
- 2011 IEEE International Symposium on Hardware-Oriented Security and Trust
- 2011
- 107
- PDF
Hardware Trojan horse detection using gate-level characterization
- Engineering, Computer Science
- 2009 46th ACM/IEEE Design Automation Conference
- 2009
- 227
- PDF
At-speed delay characterization for IC authentication and Trojan Horse detection
- Engineering, Computer Science
- 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
- 2008
- 282
- PDF
Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps
- Engineering, Computer Science
- IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- 2014
- 69
- PDF
A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
- Engineering, Computer Science
- IEEE Transactions on Very Large Scale Integration (VLSI) Systems
- 2012
- 210
- PDF
Malicious circuitry detection using fast timing characterization via test points
- Engineering, Computer Science
- 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
- 2013
- 11
- PDF
Hardware Trojan detection for gate-level ICs using signal correlation based clustering
- Engineering, Computer Science
- 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE)
- 2015
- 47
- PDF
High-sensitivity hardware Trojan detection using multimodal characterization
- Engineering, Computer Science
- 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE)
- 2013
- 61
- PDF
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
- Engineering, Computer Science
- J. Electron. Test.
- 2011
- 57
- PDF