2016
DOI: 10.1109/access.2016.2575039
|View full text |Cite
|
Sign up to set email alerts
|

A New Characterization of Hardware Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Thus, security is not the most important factor for such low-priced devices. This results in the introduction to the market of less secure products, or their alternatives, due to the need for low cost [19,20].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, security is not the most important factor for such low-priced devices. This results in the introduction to the market of less secure products, or their alternatives, due to the need for low cost [19,20].…”
Section: Related Workmentioning
confidence: 99%
“…A classification of attributes based on this model is illustrated in Figure 2. The relationships between these attributes were presented in [21] and used to identify the attributes that can be detected using a given technique. For example, a technique that can detect a sequential trojan circuit can also detect a combinational trojan circuit, or a technique that can detect a small trojan can also detect a large trojan.…”
Section: Hardware Trojans and Their Detectionmentioning
confidence: 99%
“…These attributes provide a complete characterization of trojans. In [21], the relationships between the attributes were studied and used to describe the trojan life cycle from the insertion phase to the location phase. Assigning weights to these attributes was also considered.…”
Section: Hardware Trojan Attributesmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, a significant power consumption in L2 caches is caused by the fact that the L2 cache needs a high associativity to reduce the conflict misses, making large energy to be spent on tag comparisons and because the cache coherence for CMPs increases the power consumption in tag comparison. Elsewhere, the recent advancements in video streaming, image processing and high speed wireless communication have immensely affected the way the cache is being designed [50,68]. The technological advancements place demands for high performance and low energy consumption in embedded systems.…”
Section: Introductionmentioning
confidence: 99%