Title :
The Novel Design Method of Hardware Trojans
Author :
Zhengyou Wei;Wenfeng Feng;Lei Li
Author_Institution :
Res. Inst. of Electron. Sci. &
Abstract :
In this paper, according to the obfuscation design idea of hardware protection, we present a hardware Trojans generating method based on obfuscation design. We take the AES algorithm as the target circuits and compare the impacts of the Hardware Trojans circuits after the obfuscation design on the area, power and timing-delay with the original circuits, and achieve to increase the difficult of functional verification and logic detection.
Keywords :
"Trojan horses","Hardware","Integrated circuit modeling","Load modeling","Logic gates","Timing"
Conference_Titel :
Computational Intelligence and Design (ISCID), 2015 8th International Symposium on
Print_ISBN :
978-1-4673-9586-1
DOI :
10.1109/ISCID.2015.284