2018 IEEE International Test Conference (ITC) 2018
DOI: 10.1109/test.2018.8624705
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Dithering: A Run-Time Method for Trojan Neutralization in Wireless Cryptographic ICs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…SSCF; ACE; Use hardware dithering as a prevention mechanism [34] . [31] Leaks data using spread spectrum techniques.…”
Section: Refmentioning
confidence: 99%
See 1 more Smart Citation
“…SSCF; ACE; Use hardware dithering as a prevention mechanism [34] . [31] Leaks data using spread spectrum techniques.…”
Section: Refmentioning
confidence: 99%
“…Finally, it is possible to design a proactive defense mechanism that challenges the operation principle of the HT with the aim to neutralize it. An example is the hardware dithering technique proposed in [34].…”
Section: Refmentioning
confidence: 99%
“…Literature [27][28][29][30] conducted many similar studies with HTs in the wireless cryptographic ICs and statistical side-channel (power, delay, temperature, current) was proposed for the defense. Some other notable techniques for the study of HT in the wireless cryptographic ICs proposed by researchers are Forward Error Correction (FEC) technique [31], RF Transmission below noise level [32], Hardware dithering technique [33] Information Flow Tracking (IFT) technique [34], self-referencing technique [35][36], etc. The gap in the literature mentioned for the HT in the analog/RF domain so far is that the study is specific to AM/FM modulation scheme which is not very widely used in higher speed wireless communication.…”
Section: Introductionmentioning
confidence: 99%