2013 IEEE 4th International Conference on Electronics Information and Emergency Communication 2013
DOI: 10.1109/iceiec.2013.6835515
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan detection by specifying malicious circuit properties

Abstract: Ahstract-This work addresses the increasing danger of ship ping integrated circuits (either fully digital or mixed signal) that contain malicious hardware modifications. Potential security threads are established by so called hardware Trojans, imple mented in the physical silicon structure. A desire of system engineers is to identify such back-door functionalities during an early design phase. The paper discusses how techniques deduced from model checking applications can be used for Trojan detection. A set of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Many of the examinations and checks can be automated. It therefore complements approaches like [2] and partly incorporates [8]. Rule sets and knowledge base can be shared among industry, similar to personal computer anti-virus companies sharing their knowledge and fingerprints with each other.…”
Section: Limitationsmentioning
confidence: 97%
“…Many of the examinations and checks can be automated. It therefore complements approaches like [2] and partly incorporates [8]. Rule sets and knowledge base can be shared among industry, similar to personal computer anti-virus companies sharing their knowledge and fingerprints with each other.…”
Section: Limitationsmentioning
confidence: 97%
“…To address these research challenges, we propose a novel and generic framework for formal analysis of security vulnerabilities (ForASec, Section 4) to perform the security analysis while considering the complete coverage of parametric behavior (i.e., leakage power, dynamic power and propagation delay) and process variations. The proposed ForASec consists of the following key components: [20], [21], [22], [23] [26], [27] [24]…”
Section: Our Novel Contributionmentioning
confidence: 99%
“…Typically, model based simulations are used for analyzing the security vulnerabilities [14], [15], but they cannot cover all possible test cases in complex systems because of their computational constraints (energy and memory) [16] and floating point inaccuracies [17]. To ensure the completeness and accuracy, mathematical modeling and formal verification based vulnerability analysis techniques have been proposed [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], as shown in Table 1. Although, to some extent, mathematical modeling can overcome above-mentioned limitations, it is still prone to human error and increases the design time.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation