Efficient Hardware Trojan Detection with Differential Cascade Voltage Switch Logic

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Trojan Identification and Detection

The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...

متن کامل

A Hardware Trojan Detection Framework

In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...

متن کامل

Formal Design Procedures for Differential Cascode Voltage Switch with Pass Gate (dcvspg) Logic

In this paper, a formal design approach for the differential cascode voltage switch with pass gate (DCVSPG) logic is presented. This permits the design of any combinational logic function by the use of a k-map or by a modified QuineMcCluskey algorithm. The basic design approach used is based on pass logic and shows that a DCVSPG logic gate designed with minimum number of transistors may not alw...

متن کامل

Hardware Trojan vulnerability

Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single positive feedback loop. By example, it is shown...

متن کامل

System-level protection and hardware Trojan detection using weighted voting☆

The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: VLSI Design

سال: 2014

ISSN: 1065-514X,1563-5171

DOI: 10.1155/2014/652187