SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION by HARINI BHAMIDIPATI
نویسنده
چکیده
منابع مشابه
MERO: A Statistical Approach for Hardware Trojan Detection
In order to ensure trusted in–field operation of integrated circuits, it is important to develop efficient low–cost techniques to detect malicious tampering (also referred to as Hardware Trojan) that causes undesired change in functional behavior. Conventional post–manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection...
متن کاملDetection of inner Solar System Trojan Asteroids by Gaia
The Gaia satellite, planned for launch by the European Space Agency (ESA) in 2013, is the next generation astrometry mission following Hipparcos. While mapping the whole sky, the Gaia space mission is expected to discover thousands of Solar System Objects. These will include Near-Earth Asteroids and serve with ground-based telescopes. We present the results of simulations for the detection of T...
متن کاملImproved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability
Test generation for Hardware Trojan Horses (HTH) detection is extremely challenging, as Trojans are designed to be triggered by very rare logic conditions at internal nodes of the circuit. In this paper, we propose a Genetic Algorithm (GA) based Automatic Test Pattern Generation (ATPG) technique, enhanced by automated solution to an associated Boolean Satisfiability problem. The main insight is...
متن کاملA Practical Test Patterns Generation Technique for Hardware Trojan Detection
Due to the globalization of the integrated circuit manufacturing industry, hardware Trojans constitutes an increasingly probable threat to both military and commercial applications. The Trojans being stealthy in nature, the Trojan hardware is hard to be triggered under random patterns. In this paper, we propose practical test patterns generation technique based on rare logic conditions at inter...
متن کاملSelf-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection
Malicious modification of integrated circuits (ICs) in untrusted foundry, referred to as “Hardware Trojan”, has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured ...
متن کامل