2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID) 2016
DOI: 10.1109/vlsid.2016.143
|View full text |Cite
|
Sign up to set email alerts
|

Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 46 publications
(20 citation statements)
references
References 16 publications
0
19
0
Order By: Relevance
“…Design stage Trojan detection methods are utilized to support IC developers and designers for validation of IP cores and the final designs. Present design stage detection techniques can be classified into formal verification (Jin et al 2013;Guo et al 2015;Rajendran et al 2015;Rajendran et al 2016), code coverage analysis (Hicks et al 2010;Sturton et al 2011), logic testing, functional analysis (Waksman et al 2013), and structural analysis Tehranipoor et al 2013).…”
Section: Countermeasures Against Ic Trojan Attacksmentioning
confidence: 99%
“…Design stage Trojan detection methods are utilized to support IC developers and designers for validation of IP cores and the final designs. Present design stage detection techniques can be classified into formal verification (Jin et al 2013;Guo et al 2015;Rajendran et al 2015;Rajendran et al 2016), code coverage analysis (Hicks et al 2010;Sturton et al 2011), logic testing, functional analysis (Waksman et al 2013), and structural analysis Tehranipoor et al 2013).…”
Section: Countermeasures Against Ic Trojan Attacksmentioning
confidence: 99%
“…However, the complexity of such an analysis method is extremely high, which increases with the circuit size exponentially [78]. In formal verification methods, IPs are verified by proof‐checking tools to avoid including unintended functionalities [7982]. Design‐for‐trust techniques have also been proposed.…”
Section: Pip Vendor Attacksmentioning
confidence: 99%
“…Although formal methods in (b) have proven effective to detect HTs violating the security properties (Rathmair and Schupfer 2014), especially in detecting information leakage (Rajendran et al 2016) and malicious modifications of data (Rajendran et al 2015). The security properties are time-consuming and error-prone to write, which is a challenging task for the SoC designers.…”
Section: Hardware Trojans Detectionmentioning
confidence: 99%