2013
DOI: 10.1109/tc.2012.200
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
57
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 209 publications
(58 citation statements)
references
References 25 publications
1
57
0
Order By: Relevance
“…Such HTs remain implicitly on, and have usually no effect on the normal functionality of the circuit. Side channels include power based channels [22], as well as heat based channels [23]. Power based HTs force the circuit to dissipate more and more power to either damage the circuit, or simply waste energy.…”
Section: Related Workmentioning
confidence: 99%
“…Such HTs remain implicitly on, and have usually no effect on the normal functionality of the circuit. Side channels include power based channels [22], as well as heat based channels [23]. Power based HTs force the circuit to dissipate more and more power to either damage the circuit, or simply waste energy.…”
Section: Related Workmentioning
confidence: 99%
“…A different perspective is to use these side-channel measurements to determine if malware has been inserted into a circuit, either in hardware or software. Numerous side-channel techniques have been proposed [31][32][33][34][35] to detect the presence of malicious hardware in commercial ICs. In [36], the authors demonstrated the ability to determine the class of instructions, based on hardware usage, from power supply side-channel measurements.…”
Section: Ic-level Detectionmentioning
confidence: 99%
“…Hardware Trojan is also used to cause or amplify side-channel leakage of cryptographic hardware [25]. Note that using side channels to detect a hardware Trojan has also been the subject of several studies [26], [27], [28].…”
Section: Salware Vs Malwarementioning
confidence: 99%