Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level

  • Hassan Salmani


Addressing hardware Trojans at the layout level has mainly focused on two sets of techniques: some techniques are to prevent hardware Trojan insertion by an untrusted manufacturer, and some other techniques are to improve hardware Trojan detection after circuit manufacturing. This chapters studies some of major work in this area and discusses their effectiveness.


  1. 1.
    H. Salmani, M. Tehranipoor, J. Plusquellic, A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Trans. Very Large Scale Integr. Syst. 20(1), 112–125 (2012)CrossRefGoogle Scholar
  2. 2.
    H. Salmani, M. Tehranipoor, Layout-aware switching activity localization to enhance hardware Trojan detection. IEEE Trans. Inf. Forensics Secur. 7(1), 76–87 (2012)CrossRefGoogle Scholar
  3. 3.
    X. Zhang, A. Ferraiuolo, M. Tehranipoor, Detection of trojans using a combined ring oscillator network and off-chip transient power analysis. J. Emerg. Technol. Comput. Syst. 9(3), 25:1–25:20 (2013)CrossRefGoogle Scholar
  4. 4.
    T.F. Wu, K. Ganesan, Y.A. Hu, H.S.P. Wong, S. Wong, S. Mitra, TPAD: hardware Trojan prevention and detection for trusted integrated circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(4), 521–534 (2016)CrossRefGoogle Scholar
  5. 5.
    X. Wang, Y. Zheng, A. Basak, S. Bhunia, IIPS: infrastructure IP for secure SoC design. IEEE Trans. Comput. 64(8), 2226–2238 (2015)MathSciNetCrossRefGoogle Scholar
  6. 6.
    K. Xiao, X. Zhang, M. Tehranipoor, A clock sweeping technique for detecting hardware Trojans impacting circuits delay. IEEE Des. Test 30(2), 26–34 (2013)CrossRefGoogle Scholar
  7. 7.
    X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware trojan detection and isolation using current integration and localized current analysis, in 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems (2008), pp. 87–95Google Scholar
  8. 8.
    B. Cha, S.K. Gupta, Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost, in 2013 Design, Automation Test in Europe Conference Exhibition (DATE) (2013), pp. 1265–1270Google Scholar
  9. 9.
    D. Forte, C. Bao, A. Srivastava, Temperature tracking: an innovative run-time approach for hardware Trojan detection, in 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (2013), pp. 532–539Google Scholar
  10. 10.
    C. Bao, D. Forte, A. Srivastava, On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1), 49–57 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Hassan Salmani
    • 1
  1. 1.EECS DepartmentHoward UniversityWashington, DCUSA

Personalised recommendations