Title :
Towards a hardware Trojan detection methodology
Author :
Kitsos, Paris ; Voyiatzis, Artemios G.
Author_Institution :
Informatics Engineering Department Technological Educational Institute of Westem Greece and Industrial Systems Institute/RC “Athena”
Abstract :
Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy for uncovering efficiently hardware Trojan horses in mass-produced integrated circuits.
Keywords :
Delays; Hardware; Integrated circuit modeling; Power demand; Trojan horses; Vectors; detection techniques; integrated circuits; security hardware Trojans horses; trusted hardware;
Conference_Titel :
Embedded Computing (MECO), 2014 3rd Mediterranean Conference on
Conference_Location :
Budva, Montenegro
Print_ISBN :
978-1-4799-4827-7
DOI :
10.1109/MECO.2014.6862687