DocumentCode
3773448
Title
The Novel Design Method of Hardware Trojans
Author
Zhengyou Wei;Wenfeng Feng;Lei Li
Author_Institution
Res. Inst. of Electron. Sci. &
Volume
1
fYear
2015
Firstpage
173
Lastpage
176
Abstract
In this paper, according to the obfuscation design idea of hardware protection, we present a hardware Trojans generating method based on obfuscation design. We take the AES algorithm as the target circuits and compare the impacts of the Hardware Trojans circuits after the obfuscation design on the area, power and timing-delay with the original circuits, and achieve to increase the difficult of functional verification and logic detection.
Keywords
"Trojan horses","Hardware","Integrated circuit modeling","Load modeling","Logic gates","Timing"
Publisher
ieee
Conference_Titel
Computational Intelligence and Design (ISCID), 2015 8th International Symposium on
Print_ISBN
978-1-4673-9586-1
Type
conf
DOI
10.1109/ISCID.2015.284
Filename
7468926
Link To Document