DocumentCode
189773
Title
Towards a hardware Trojan detection methodology
Author
Kitsos, Paris ; Voyiatzis, Artemios G.
Author_Institution
Informatics Engineering Department Technological Educational Institute of Westem Greece and Industrial Systems Institute/RC “Athena”
fYear
2014
fDate
15-19 June 2014
Firstpage
18
Lastpage
23
Abstract
Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy for uncovering efficiently hardware Trojan horses in mass-produced integrated circuits.
Keywords
Delays; Hardware; Integrated circuit modeling; Power demand; Trojan horses; Vectors; detection techniques; integrated circuits; security hardware Trojans horses; trusted hardware;
fLanguage
English
Publisher
ieee
Conference_Titel
Embedded Computing (MECO), 2014 3rd Mediterranean Conference on
Conference_Location
Budva, Montenegro
Print_ISBN
978-1-4799-4827-7
Type
conf
DOI
10.1109/MECO.2014.6862687
Filename
6862687
Link To Document