DocumentCode :
3322219
Title :
A survey on hardware trojan detection techniques
Author :
Bhasin, Shivam ; Regazzoni, Francesco
Author_Institution :
Telecom ParisTech & Temasek Labs., NTU, Singapore, Singapore
fYear :
2015
fDate :
24-27 May 2015
Firstpage :
2021
Lastpage :
2024
Abstract :
Hardware Trojans recently emerged as a serious issue for computer systems, especially for those used in critical applications such as medical or military. Trojan proposed so far can affect the reliability of a device in various ways. Proposed effects range from the leakage of secret information to the complete malfunctioning of the device. A crucial point for securing the overall operation of a device is to guarantee the absence of hardware Trojans. In this paper, we survey several techniques for detecting malicious modification of circuit introduced at different phases of the design flow. We also highlight their capabilities limitations in thwarting hardware Trojans.
Keywords :
invasive software; hardware Trojan detection techniques; malicious modification detection; secret information leakage; Hardware; Integrated circuits; Integrated optics; Layout; Testing; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems (ISCAS), 2015 IEEE International Symposium on
Conference_Location :
Lisbon
Type :
conf
DOI :
10.1109/ISCAS.2015.7169073
Filename :
7169073
Link To Document :
بازگشت