2021
DOI: 10.1049/ell2.12405
|View full text |Cite
|
Sign up to set email alerts
|

Design and analysis of hardware Trojans in approximate circuits

Abstract: Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate accelerators. Unfortunately, recent works show that approximate circuits also have security vulnerabilities. Hardware Trojan is one of the biggest threats to hardware security. However, very limited research has been conducted on hardware Trojans in approximate cir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The average and standard deviation were obtained from three repetitions. More information can be obtained from a previous study 24,25 …”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The average and standard deviation were obtained from three repetitions. More information can be obtained from a previous study 24,25 …”
Section: Methodsmentioning
confidence: 99%
“…More information can be obtained from a previous study. 24,25 The thermal resistance (R th ) was calculated as:…”
Section: Thermal Conductivity and Resistivitymentioning
confidence: 99%
“…The error quality or approximation degree of the approximate circuit is measured by a series of error indicators, such as error Magnitude (EM), worst case error (WCE), mean absolute error (MAE), etc. These metrics have corresponding explanations in [9], and users usually choose approximate circuits based on these error metrics.…”
Section: A Approximate Circuitsmentioning
confidence: 99%
“…Approximate computing has been successfully applied to various hardware circuits, such as approximate FFT [5], approximate neural networks [6] [7], etc. Recently, the security vulnerabilities of approximate circuits have been investigated [8] [9]. [8] points out that errors and hardware Trojans are difficult to distinguish, which opens new opportunities for attackers.…”
Section: Introductionmentioning
confidence: 99%