scispace - formally typeset
Open AccessJournal ArticleDOI

System-level protection and hardware Trojan detection using weighted voting.

TLDR
Simulation results show that the proposed method achieves higher probability of Trojan detection over a naive implementation of simple voting on the output of different IP cores, and requires less hardware overhead when compared with a simple voting technique achieving the same degree of security.
About
This article is published in Journal of Advanced Research.The article was published on 2014-07-01 and is currently open access. It has received 26 citations till now. The article focuses on the topics: Hardware Trojan & Trojan.

read more

Citations
More filters
Proceedings ArticleDOI

Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs

TL;DR: This paper provides a detailed analysis on how delay variations can lead to non-ideal behavior of control paths in 3-D ICs and demonstrates that a hardware intruder can leverage this phenomenon to trigger the payload, without requiring a separate triggering circuit.
Proceedings ArticleDOI

Self Aware SoC Security to Counteract Delay Inducing Hardware Trojans at Runtime

TL;DR: This work proposes a self aware approach which works on the observe-decide-act (ODA) paradigm to counteract the effects of Trojans, which may induce sudden unintentional delays at runtime, affecting the basic security principles of the SoC.
Journal ArticleDOI

Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection

TL;DR: The relation between combinational 0/1-controllability and 0/ 1-probability is revealed and a static transition probability analysis based on the proposed difference-amplified controllability is proposed, which can be easily obtained by the Sandia Controllability/Observability Analysis Program.
References
More filters
Journal ArticleDOI

A Survey of Hardware Trojan Taxonomy and Detection

TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Proceedings ArticleDOI

Hardware Trojan detection using path delay fingerprint

TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Journal ArticleDOI

Preventing IC Piracy Using Reconfigurable Logic Barriers

TL;DR: A combinational locking scheme based on intelligent placement of the barriers throughout the design in which the objective is to maximize the effectiveness of the barrier and to minimize the overhead is proposed.
Proceedings ArticleDOI

Hardware Trojan horse detection using gate-level characterization

TL;DR: A technique for recovery of characteristics of gates in terms of leakage current, switching power, and delay is introduced, which utilizes linear programming to solve a system of equations created using nondestructive measurements of power or delays to detect embedded HTHs.
Related Papers (5)