Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some Cryptocores
Citations
13 citations
Cites background or methods from "Analysis of Secret Key Revealing Tr..."
...A similar scenario using the parameter of path delay has been demonstrated in [21]....
[...]
...HTH implemented has the structure depicted in [5], [21]....
[...]
...Introduction of HTH can make these security critical SOC architectures confidentially compromised [5], [21]....
[...]
References
1,227 citations
"Analysis of Secret Key Revealing Tr..." refers background in this paper
...The authors in [1, 2] present a detailed study of classification of Hardware Trojans and a survey of published techniques of Trojan detection....
[...]
...parts, microcontrollers, network processors, digital signal processors (DSP) or a modification in firmware like FPGA bitstreams [1]....
[...]
...The effects of hardware Trojans can range from unsuccessful functional operation of IC to the detoriation of reliability and expected lifetime of ICs [1, 2]....
[...]
...However, the IP blocks, models and standard cells used by the designer during the design process and by the foundry during the post design process are considered untrusted [1]....
[...]
854 citations
260 citations
"Analysis of Secret Key Revealing Tr..." refers methods in this paper
...A technique for improving hardware trojan detection and reducing trojan activation time is proposed in [8] as time to activate a hardware trojan circuit is a major concern from the authentication viewpoint....
[...]
207 citations
"Analysis of Secret Key Revealing Tr..." refers background or methods in this paper
...Combination of side channel analysis and logic testing approach to provide high overall detection coverage for hardware trojan circuits of varying types and sizes is also discussed in [9]....
[...]
...A novel noninvasive, multiple-parameter side-channel analysis based trojan detection approach is discussed in [9] where the authors use an intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a trojan from process noise....
[...]