Proceedings of the Workshop on Embedded Systems Security 2013
DOI: 10.1145/2527317.2527318
|View full text |Cite
|
Sign up to set email alerts
|

Hardware trojan design and detection

Abstract: Hardware Trojan design and detection have been extensively studied during the last years. In this work we investigate non-invasive detection methods utilizing so-called side-channel analysis. In the past, almost all proposed detection techniques have been evaluated based on simulations only and thus, the question remains how well they perform in practice. Therefore, we perform a practical evaluation of two previously published Trojan detection methods based on principal component analysis. We evaluate those me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…In [19], authors present a practical evaluation of previously proposed techniques such as PCA [2] and proposed an improved method based on cumulative probability distribution.…”
Section: Side Channel Based Detection Techniquesmentioning
confidence: 99%
“…In [19], authors present a practical evaluation of previously proposed techniques such as PCA [2] and proposed an improved method based on cumulative probability distribution.…”
Section: Side Channel Based Detection Techniquesmentioning
confidence: 99%
“…Banga et al [9] introduced the sustained vector technique that can be used to magnify the difference in power consumption between the golden circuit and a possibly infected ones. In [43], authors present a practical evaluation of previously proposed techniques and proposed an improved method based on cumulative probability distribution.…”
Section: B Hardware Trojan Detection Techniquesmentioning
confidence: 99%
“…Jin and Makris [18] functional design † † Chakraborty et al [19] functional design † † Agrawal et al [10] functional design † † King et al [20] functional design † † Lin et al [21] functional design † † Kutzner et al [23] functional design † † Muehlberghuber et al [24] physical design † † Bhasin et al [25] physical design † † Becker et al [26] fabrication † † design. They can modify the specification, so as to leave room for insertion of a Trojan during a later design phase.…”
Section: Condition Basedmentioning
confidence: 99%