Trojan Detection using IC Fingerprinting

  title={Trojan Detection using IC Fingerprinting},
  author={Dakshi Agrawal and Selçuk Baktir and Deniz Karakoyunlu and Pankaj Rohatgi and Berk Sunar},
  journal={2007 IEEE Symposium on Security and Privacy (SP '07)},
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to their much lower cost structure. This poses a significant security risk for ICs used for critical military and business applications. Attackers can exploit this loss of control to substitute Trojan ICs for genuine ones or insert a Trojan circuit into the design or mask used for fabrication. We show that a technique borrowed from side-channel cryptanalysis can be used to mitigate this problem. Our… CONTINUE READING
Highly Influential
This paper has highly influenced 41 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 570 citations. REVIEW CITATIONS
369 Citations
24 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 369 extracted citations

570 Citations

Citations per Year
Semantic Scholar estimates that this publication has 570 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 24 references

Library Compiler Reference Manual: Technology and Symbol Libraries, version x-2005.09

  • Synopsys Inc
  • 2005
Highly Influential
3 Excerpts

On the impossibility of obfuscation with auxiliary input

  • Shafi Goldwasser
  • 2005

White paper: National security aspects of the global migration of the U.S. semiconductor industry

  • Joseph I. Lieberman
  • 2003
1 Excerpt

Similar Papers

Loading similar papers…