2007 IEEE Symposium on Security and Privacy (SP '07) 2007
DOI: 10.1109/sp.2007.36
|View full text |Cite
|
Sign up to set email alerts
|

Trojan Detection using IC Fingerprinting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

2
381
0
3

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 647 publications
(386 citation statements)
references
References 12 publications
2
381
0
3
Order By: Relevance
“…Agrawal et al [2] introduced the hardware Trojan problem and proposed the first HT detection approach using fingerprints generated from IC side channels. Thereafter, a large number of HT detection methods have been proposed, which can be classified into two categories.…”
Section: Hardware Trojan Detectionmentioning
confidence: 99%
“…Agrawal et al [2] introduced the hardware Trojan problem and proposed the first HT detection approach using fingerprints generated from IC side channels. Thereafter, a large number of HT detection methods have been proposed, which can be classified into two categories.…”
Section: Hardware Trojan Detectionmentioning
confidence: 99%
“…Agrawal et al [1] use destructive tests to extract a fingerprint for a group of unaltered chips based on the global transient power signal characteristics. The other chips would be noninvasively tested against the extracted fingerprints by statistical Hypothesis testing.…”
Section: Related Workmentioning
confidence: 99%
“…Side Channel Analysis (SCA) is an important detection method to address this problem [1,2,3,4]. SCA, borrowed from cryptographic analysis, was proposed by IBM in [2].…”
mentioning
confidence: 99%
“…Side Channel Analysis (SCA) is an important detection method to address this problem [1,2,3,4]. SCA, borrowed from cryptographic analysis, was proposed by IBM in [2]. In [2], the authors modeled the IC process noise and presented the basic theoretical framework of side-channel analysis as a HT detection method.…”
mentioning
confidence: 99%