2011 IEEE International Symposium on Hardware-Oriented Security and Trust 2011
DOI: 10.1109/hst.2011.5954999
|View full text |Cite
|
Sign up to set email alerts
|

TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(43 citation statements)
references
References 6 publications
0
43
0
Order By: Relevance
“…Functional testing [4], [12], [13] verifies if the functionality of the IC under test is the same as specified. Side-channel fingerprinting [3], [7], [9] measures some side-channel signals (path delays, power, etc.) to distinguish Trojan-infected ICs from genuine ones.…”
Section: Backgroud a Trojans And Conutermeasuresmentioning
confidence: 99%
“…Functional testing [4], [12], [13] verifies if the functionality of the IC under test is the same as specified. Side-channel fingerprinting [3], [7], [9] measures some side-channel signals (path delays, power, etc.) to distinguish Trojan-infected ICs from genuine ones.…”
Section: Backgroud a Trojans And Conutermeasuresmentioning
confidence: 99%
“…Functional testing [2]- [4] aims to detect HTs that change the functionality (primary outputs) of the IC from the intended one. Side-channel fingerprinting [11], [12] is an alternative approach that measures side channel signals (timing, power, etc.) and uses them to distinguish genuine ICs from Trojaninfested ones.…”
Section: Trojan Detection Techniquesmentioning
confidence: 99%
“…We used polynomial kernel function defined by (11) and chose degree d = 5. We used the default in LIBSVM γ = 0.2.…”
Section: A Experiments Setupmentioning
confidence: 99%
“…However, while the same symmetries can be exploited here, there are other symmetries that are not dependent on a signal bus, opening up for wider applicability. Continued work in [12] demonstrates that HTs can be detected as inconsistent power consumption when an IC repeatedly cycles along a closed loop in its finite state diagram but the HT, if using sequential logic, continues to change its state and expend different energies doing so. The authors contend, as we do, that the idea of a golden sample should be abandoned in favor of selfreferencing methods in order to greatly increase confidence in the presence of HTs despite growing inter-and intra-die variations throughout smaller technology nodes.…”
Section: Introductionmentioning
confidence: 98%