The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hardware Trojan embedded by adversaries has emerged as a serious security threat. Until now, there is no a universal method for effective and accurate detection. Since traditional analysis approaches sometime seem helpless when the Trojan area is extremely tiny, this paper will focus on the novel detection method based on frequency spectrum analysis. Meanwhile, a failure physics model is presented...
Modern Integrated Circuits (ICs) are becoming increasingly vulnerable to malicious inclusions and alterations (hardware Trojans) due to the globalization of semiconductor design and fabrication processes, which brings in the requirement for reliable detection of hardware Trojans made in an untrusted fabrication facility during post-manufacturing test. In this paper, we present a new method for Trojan...
Malicious modification of integrated circuits, namely Hardware Trojan, has emerged as a major security threat. Since it is extremely difficult to detect the presence of such small Trojan circuits using only logic test or side-channel analysis, this paper presents a novel test method combining logic test and side-channel test together. An 18-bit CORDIC IP core is adopted as a golden circuit, while...
Malicious modification of integrated circuits referred to as Hardware Trojan fabricated in untrusted foundries pose a growing concern on reliable and security application. In order to ensure trusted in-filed operation of integrated circuits, many techniques are developed to authenticate Hardware Trojan often called trojan detection. Among these techniques side-channel signals analysis is a widely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.