2009
DOI: 10.1007/978-3-642-04138-9_28
|View full text |Cite
|
Sign up to set email alerts
|

MERO: A Statistical Approach for Hardware Trojan Detection

Abstract: Abstract. In order to ensure trusted in-field operation of integrated circuits, it is important to develop efficient low-cost techniques to detect malicious tampering (also referred to as Hardware Trojan) that causes undesired change in functional behavior. Conventional postmanufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection. In this paper, we propose a test pattern generation technique based on multiple excitation of rare logic co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
154
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 310 publications
(159 citation statements)
references
References 12 publications
1
154
0
Order By: Relevance
“…In [9], Chakraborty et al propose to generate a set of test patterns that maximizes the chance to detect a HT. The proposed methodology is Called MERO (for Multiple Excitation of Rare Occurrence).…”
Section: B Hts Detection Methods Based On Ht Activationmentioning
confidence: 99%
See 1 more Smart Citation
“…In [9], Chakraborty et al propose to generate a set of test patterns that maximizes the chance to detect a HT. The proposed methodology is Called MERO (for Multiple Excitation of Rare Occurrence).…”
Section: B Hts Detection Methods Based On Ht Activationmentioning
confidence: 99%
“…HTs detection methods are divided into two categories: methods based on side-channel analysis [7,8], or logic testing [6,9]. In the latter case, logic testing is performed before deployment in the field to try to detect the presence of potential HTs: if an erroneous behavior of the IC is observed, it can be inferred that a HT has been inserted in the IC.…”
Section: Introductionmentioning
confidence: 99%
“…- [9][10][11][12]. However, the large number of states/inputs in modern designs limit the accuracy of these approaches, especially for Trojans that have extremely low trigger probability.…”
Section: Detection Techniquesmentioning
confidence: 99%
“…However, this approach is time consuming and requires significant resources, so it is not practical to examine a large number of chips. In practice, defenders rely on non-destructive techniques to determine if a chip is working probably [7][8][9]. These techniques can be employed during testing and/or chip operation.…”
Section: Introductionmentioning
confidence: 99%