2017
DOI: 10.1016/j.vlsi.2017.03.009
|View full text |Cite
|
Sign up to set email alerts
|

Hardware trojans in 3-D ICs due to NBTI effects and countermeasure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…As the heating element is enabled, and it approaches the primary thermal point (T p1 −60 • C), operation mode 2 (01) is enforced. In this mode, the fixed sensor segment (FSS) remains dormant (0), whereas the dynamic sensor segment (DSS) assumes the threshold voltage-aware mode (1). Every inverter in DSS is now subjected to dc stress (induced by gradual shifts in threshold voltage) by pulling its input to the ground.…”
Section: A Threshold Voltage Based Sensor Architecturementioning
confidence: 99%
“…As the heating element is enabled, and it approaches the primary thermal point (T p1 −60 • C), operation mode 2 (01) is enforced. In this mode, the fixed sensor segment (FSS) remains dormant (0), whereas the dynamic sensor segment (DSS) assumes the threshold voltage-aware mode (1). Every inverter in DSS is now subjected to dc stress (induced by gradual shifts in threshold voltage) by pulling its input to the ground.…”
Section: A Threshold Voltage Based Sensor Architecturementioning
confidence: 99%
“…In the current semiconductor business model, more and more chip designs are outsourced for fabrication. As a result, neither all single die fabrication foundries nor vertical interconnect manufacturers are trusted [6,[20][21][22][23]26].…”
Section: Our Survey On Existing Hardware Trojans In 3d Integrated Circuits and Systemsmentioning
confidence: 99%
“…The unexpected transition glitches can be employed to design Trojan triggers. As indicated in [20,21], thermaltriggered Trojans can be inserted by any malicious foundries with access to the layout of designs. Those Trojans likely congregate near the middle tier, where heat dissipation is harder than in other tiers [21].…”
Section: Thermal-triggered 3d Trojansmentioning
confidence: 99%
“…Some articles designed or considered some potential HTs from the attacker’s point of view and put forward solutions to these HTs [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Some researchers applied HTs to the real environment and designed a scheme to defend it [ 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 ]. Individual scholars proposed methods to reduce the effect of the HTs [ 44 , 45 ].…”
Section: Introductionmentioning
confidence: 99%