Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach
Citations
444 citations
157 citations
90 citations
67 citations
Cites background from "Building Trustworthy Systems Using ..."
...These techniques can also limit the insertion of hardware Trojans [27]–[29]....
[...]
References
1,093 citations
"Building Trustworthy Systems Using ..." refers methods in this paper
...This is called diversity and is popular in the N-version software design [33]....
[...]
910 citations
"Building Trustworthy Systems Using ..." refers background in this paper
...in the context of classical fault tolerance, it has been shown that the likelihood of two 3PIPs designed by two independent sources failing in the same way is extremely low [34], [35]....
[...]
...When targeting random faults, fault detection techniques use area, time, and information redundancy [34], [35]....
[...]
...2) Duplication and Diversity: The likelihood of two IPs from two independent IP vendors failing in the same way is extremely low [34], [35]....
[...]
...Thus, multiple faulty IPs of the same type can be detected [35]....
[...]
741 citations
611 citations
"Building Trustworthy Systems Using ..." refers background in this paper
...Researchers have proposed solutions to detect Trojans inserted by a malicious foundry [5], [6], [9]–[14]....
[...]
588 citations
"Building Trustworthy Systems Using ..." refers background in this paper
...Trojans that affect the performance of an SoC can be detected and disabled by a complementary technique that monitors 3PIP power consumption/delay [41]....
[...]