DocumentCode
3171990
Title
Performance of delay-based Trojan detection techniques under parameter variations
Author
Rai, Devendra ; Lach, John
Author_Institution
Charles L. Brown Dept. of Electr. & Comput. Eng., Univ. of Virginia, Charlottesville, VA, USA
fYear
2009
fDate
27-27 July 2009
Firstpage
58
Lastpage
65
Abstract
Various schemes utilizing path delay information have been proposed to determine the authenticity of a given integrated circuit. However, the performance of these techniques under parameter variations must be evaluated, as delay variations may mask the delay impact of design alterations, such as hardware Trojan horses. This paper examines how path delay characterization performs under extensive delay variations, and results reveal that it remains a powerful tool for detecting design alterations by leveraging statistical techniques.
Keywords
integrated circuits; security of data; statistical analysis; delay-based Trojan detection techniques; hardware Trojan horses; integrated circuit; parameter variations; path delay characterization; path delay information; statistical techniques; Clocks; Delay; Displays; Electric variables; Hardware; Integrated circuit interconnections; Invasive software; Manufacturing; Signal processing; Timing;
fLanguage
English
Publisher
ieee
Conference_Titel
Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on
Conference_Location
Francisco, CA
Print_ISBN
978-1-4244-4805-0
Electronic_ISBN
978-1-4244-4804-3
Type
conf
DOI
10.1109/HST.2009.5224966
Filename
5224966
Link To Document