Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2015 2015
DOI: 10.7873/date.2015.1104
|View full text |Cite
|
Sign up to set email alerts
|

A High Efficiency Hardware Trojan Detection Technique Based on Fast SEM Imaging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 50 publications
(19 citation statements)
references
References 0 publications
0
19
0
Order By: Relevance
“…This results in an impractical technique of reading out the complete memory of several mm 2 . Whereas in the security community, Scanning Electron Microscopy has been recently used for hardware trojan detection [21] [5] and for spatially resolved laser fault injection [4]. Following those investigations, we show in this paper how Flash EEPROM contents commonly thought unreachable are retrieved using artefact free backside sample preparation, fined tuned SEM acquisitions (Voltage Contrast mode) and efficient image processing.…”
Section: Introductionmentioning
confidence: 83%
“…This results in an impractical technique of reading out the complete memory of several mm 2 . Whereas in the security community, Scanning Electron Microscopy has been recently used for hardware trojan detection [21] [5] and for spatially resolved laser fault injection [4]. Following those investigations, we show in this paper how Flash EEPROM contents commonly thought unreachable are retrieved using artefact free backside sample preparation, fined tuned SEM acquisitions (Voltage Contrast mode) and efficient image processing.…”
Section: Introductionmentioning
confidence: 83%
“…Destructive detection is also called reverse analysis [20]. Courbon et al [21] proposed a high-efficiency hardware Trojan detection technique based on fast scanning electron microscope(SEM) imaging. However, this method came at the cost of destroying the circuit, and could only detect the circuit in a specific area.…”
Section: A Hardware Trojans Detectionmentioning
confidence: 99%
“…Courbon et al [ 107 ] proposed an efficient HT detection method with electron microscopy scanning imaging. This method uses the electron microscope to scan imagery for the single-layer structure in a chip and compares it with the standard design circuit, find out what has changed, which can accurately detect any modification, replacement, removal, or the addition of circuit door.…”
Section: Hardware Trojans Protectionmentioning
confidence: 99%