DocumentCode :
3773448
Title :
The Novel Design Method of Hardware Trojans
Author :
Zhengyou Wei;Wenfeng Feng;Lei Li
Author_Institution :
Res. Inst. of Electron. Sci. &
Volume :
1
fYear :
2015
Firstpage :
173
Lastpage :
176
Abstract :
In this paper, according to the obfuscation design idea of hardware protection, we present a hardware Trojans generating method based on obfuscation design. We take the AES algorithm as the target circuits and compare the impacts of the Hardware Trojans circuits after the obfuscation design on the area, power and timing-delay with the original circuits, and achieve to increase the difficult of functional verification and logic detection.
Keywords :
"Trojan horses","Hardware","Integrated circuit modeling","Load modeling","Logic gates","Timing"
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Design (ISCID), 2015 8th International Symposium on
Print_ISBN :
978-1-4673-9586-1
Type :
conf
DOI :
10.1109/ISCID.2015.284
Filename :
7468926
Link To Document :
بازگشت