Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level
- 548 Downloads
Addressing hardware Trojans at the layout level has mainly focused on two sets of techniques: some techniques are to prevent hardware Trojan insertion by an untrusted manufacturer, and some other techniques are to improve hardware Trojan detection after circuit manufacturing. This chapters studies some of major work in this area and discusses their effectiveness.
- 7.X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware trojan detection and isolation using current integration and localized current analysis, in 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems (2008), pp. 87–95Google Scholar
- 8.B. Cha, S.K. Gupta, Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost, in 2013 Design, Automation Test in Europe Conference Exhibition (DATE) (2013), pp. 1265–1270Google Scholar
- 9.D. Forte, C. Bao, A. Srivastava, Temperature tracking: an innovative run-time approach for hardware Trojan detection, in 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (2013), pp. 532–539Google Scholar