• DocumentCode
    189773
  • Title

    Towards a hardware Trojan detection methodology

  • Author

    Kitsos, Paris ; Voyiatzis, Artemios G.

  • Author_Institution
    Informatics Engineering Department Technological Educational Institute of Westem Greece and Industrial Systems Institute/RC “Athena”
  • fYear
    2014
  • fDate
    15-19 June 2014
  • Firstpage
    18
  • Lastpage
    23
  • Abstract
    Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy for uncovering efficiently hardware Trojan horses in mass-produced integrated circuits.
  • Keywords
    Delays; Hardware; Integrated circuit modeling; Power demand; Trojan horses; Vectors; detection techniques; integrated circuits; security hardware Trojans horses; trusted hardware;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Embedded Computing (MECO), 2014 3rd Mediterranean Conference on
  • Conference_Location
    Budva, Montenegro
  • Print_ISBN
    978-1-4799-4827-7
  • Type

    conf

  • DOI
    10.1109/MECO.2014.6862687
  • Filename
    6862687