Towards a hardware Trojan detection methodology
Title | Towards a hardware Trojan detection methodology |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Kitsos, Paris, Voyiatzis, Artemios G. |
Conference Name | Embedded Computing (MECO), 2014 3rd Mediterranean Conference on |
Date Published | June |
Keywords | delays, detection techniques, Hardware, Integrated circuit modeling, integrated circuits, Power demand, security hardware Trojans horses, Trojan horses, trusted hardware, Vectors |
Abstract | Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy for uncovering efficiently hardware Trojan horses in mass-produced integrated circuits. |
DOI | 10.1109/MECO.2014.6862687 |
Citation Key | 6862687 |