• DocumentCode
    3773448
  • Title

    The Novel Design Method of Hardware Trojans

  • Author

    Zhengyou Wei;Wenfeng Feng;Lei Li

  • Author_Institution
    Res. Inst. of Electron. Sci. &
  • Volume
    1
  • fYear
    2015
  • Firstpage
    173
  • Lastpage
    176
  • Abstract
    In this paper, according to the obfuscation design idea of hardware protection, we present a hardware Trojans generating method based on obfuscation design. We take the AES algorithm as the target circuits and compare the impacts of the Hardware Trojans circuits after the obfuscation design on the area, power and timing-delay with the original circuits, and achieve to increase the difficult of functional verification and logic detection.
  • Keywords
    "Trojan horses","Hardware","Integrated circuit modeling","Load modeling","Logic gates","Timing"
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Design (ISCID), 2015 8th International Symposium on
  • Print_ISBN
    978-1-4673-9586-1
  • Type

    conf

  • DOI
    10.1109/ISCID.2015.284
  • Filename
    7468926