System-level protection and hardware Trojan detection using weighted voting.
TLDR
Simulation results show that the proposed method achieves higher probability of Trojan detection over a naive implementation of simple voting on the output of different IP cores, and requires less hardware overhead when compared with a simple voting technique achieving the same degree of security.About:
This article is published in Journal of Advanced Research.The article was published on 2014-07-01 and is currently open access. It has received 26 citations till now. The article focuses on the topics: Hardware Trojan & Trojan.read more
Citations
More filters
Book ChapterDOI
Smart Cities Data: Framework, Applications, and Challenges
Muhammad Bilal,Raja Sher Afgun Usmani,Muhammad Tayyab,Abdullahi Akibu Mahmoud,Reem Mohamed Abdalla,Mohsen Marjani,Thulasyammal Ramiah Pillai,Ibrahim Abaker Targio Hashem +7 more
Proceedings ArticleDOI
Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs
TL;DR: This paper provides a detailed analysis on how delay variations can lead to non-ideal behavior of control paths in 3-D ICs and demonstrates that a hardware intruder can leverage this phenomenon to trigger the payload, without requiring a separate triggering circuit.
Proceedings ArticleDOI
Self Aware SoC Security to Counteract Delay Inducing Hardware Trojans at Runtime
TL;DR: This work proposes a self aware approach which works on the observe-decide-act (ODA) paradigm to counteract the effects of Trojans, which may induce sudden unintentional delays at runtime, affecting the basic security principles of the SoC.
Journal ArticleDOI
Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection
Kai Huang,Yun He +1 more
TL;DR: The relation between combinational 0/1-controllability and 0/ 1-probability is revealed and a static transition probability analysis based on the proposed difference-amplified controllability is proposed, which can be easily obtained by the Sandia Controllability/Observability Analysis Program.
References
More filters
Journal ArticleDOI
A Survey of Hardware Trojan Taxonomy and Detection
TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Proceedings ArticleDOI
Hardware Trojan detection using path delay fingerprint
Yier Jin,Yiorgos Makris +1 more
TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Journal ArticleDOI
Preventing IC Piracy Using Reconfigurable Logic Barriers
TL;DR: A combinational locking scheme based on intelligent placement of the barriers throughout the design in which the objective is to maximize the effectiveness of the barrier and to minimize the overhead is proposed.
Proceedings ArticleDOI
Hardware Trojan horse detection using gate-level characterization
TL;DR: A technique for recovery of characteristics of gates in terms of leakage current, switching power, and delay is introduced, which utilizes linear programming to solve a system of equations created using nondestructive measurements of power or delays to detect embedded HTHs.