2008 Design, Automation and Test in Europe 2008
DOI: 10.1109/date.2008.4484928
|View full text |Cite
|
Sign up to set email alerts
|

Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
136
0
2

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 151 publications
(146 citation statements)
references
References 6 publications
0
136
0
2
Order By: Relevance
“…The proposed methodology is conceptually similar to N-detect test [5,6] used in stuck-at ATPG (automatic test pattern generation), where test set is generated to detect each single stuck-at fault in a circuit by at least N different patterns, in the process improving test quality and defect coverage [6]. In this paper, we focus on digital Trojans [13], which can be inserted into a design either in a design house (e.g. by untrusted CAD tool or IP) or in a foundry.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed methodology is conceptually similar to N-detect test [5,6] used in stuck-at ATPG (automatic test pattern generation), where test set is generated to detect each single stuck-at fault in a circuit by at least N different patterns, in the process improving test quality and defect coverage [6]. In this paper, we focus on digital Trojans [13], which can be inserted into a design either in a design house (e.g. by untrusted CAD tool or IP) or in a foundry.…”
Section: Introductionmentioning
confidence: 99%
“…An intelligent adversary will try to hide such tampering of IC's functional behavior in a way that makes it extremely difficult to detect with conventional post-manufacturing test [3]. Intuitively, it means that the adversary would ensure that such a tampering is manifested or triggered under very rare conditions at the internal nodes, which are unlikely to arise during test but can occur during long hours of field operation [13]. Fig.…”
Section: Introductionmentioning
confidence: 99%
“…Wolff et al analyzed rare-net combinations in designs. 6 These rarely activated nets are used as Trojan triggers. At the same time, nets with low observability are used as payloads (see Figure 7).…”
Section: Trojan Activation Methodsmentioning
confidence: 99%
“…Wang, Tehranipoor, and Plusquellic developed the first detailed taxonomy for hardware Trojans 5 (a simple taxonomy devised earlier differentiated between payload activation logic and triggering 6 ). This comprehensive taxonomy lets researchers examine their methods against different Trojan types.…”
Section: Trojan Design and Taxonomymentioning
confidence: 99%
See 1 more Smart Citation