Data Activated Processor Hardware Trojan Detection Using Differential Bit Power Analysis
Abstract
References
Recommendations
Golden-Free Processor Hardware Trojan Detection Using Bit Power Consistency Analysis
Processor is the core chip of modern information system, which is severely threatened by hardware Trojan. Side-channel analysis is the most promising method for hardware Trojan detection. However, most existing detection methods require golden chips as ...
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC
HASP '13: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and PrivacyWe infiltrate the ASIC development chain by inserting a small denial-of-service (DoS) hardware Trojan at the fabrication design phase into an existing VLSI circuit, thereby simulating an adversary at a semiconductor foundry. Both the genuine and the ...
Security against hardware Trojan through a novel application of design obfuscation
ICCAD '09: Proceedings of the 2009 International Conference on Computer-Aided DesignMalicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The ...
Comments
Information & Contributors
Information
Published In

In-Cooperation
- Wuhan Univ.: Wuhan University, China
- University of Electronic Science and Technology of China: University of Electronic Science and Technology of China
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- National Natural Science Foundation of China
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 55Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in