Visible to the public Towards a hardware Trojan detection methodology

TitleTowards a hardware Trojan detection methodology
Publication TypeConference Paper
Year of Publication2014
AuthorsKitsos, Paris, Voyiatzis, Artemios G.
Conference NameEmbedded Computing (MECO), 2014 3rd Mediterranean Conference on
Date PublishedJune
Keywordsdelays, detection techniques, Hardware, Integrated circuit modeling, integrated circuits, Power demand, security hardware Trojans horses, Trojan horses, trusted hardware, Vectors
Abstract

Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy for uncovering efficiently hardware Trojan horses in mass-produced integrated circuits.

DOI10.1109/MECO.2014.6862687
Citation Key6862687