• DocumentCode
    3171990
  • Title

    Performance of delay-based Trojan detection techniques under parameter variations

  • Author

    Rai, Devendra ; Lach, John

  • Author_Institution
    Charles L. Brown Dept. of Electr. & Comput. Eng., Univ. of Virginia, Charlottesville, VA, USA
  • fYear
    2009
  • fDate
    27-27 July 2009
  • Firstpage
    58
  • Lastpage
    65
  • Abstract
    Various schemes utilizing path delay information have been proposed to determine the authenticity of a given integrated circuit. However, the performance of these techniques under parameter variations must be evaluated, as delay variations may mask the delay impact of design alterations, such as hardware Trojan horses. This paper examines how path delay characterization performs under extensive delay variations, and results reveal that it remains a powerful tool for detecting design alterations by leveraging statistical techniques.
  • Keywords
    integrated circuits; security of data; statistical analysis; delay-based Trojan detection techniques; hardware Trojan horses; integrated circuit; parameter variations; path delay characterization; path delay information; statistical techniques; Clocks; Delay; Displays; Electric variables; Hardware; Integrated circuit interconnections; Invasive software; Manufacturing; Signal processing; Timing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on
  • Conference_Location
    Francisco, CA
  • Print_ISBN
    978-1-4244-4805-0
  • Electronic_ISBN
    978-1-4244-4804-3
  • Type

    conf

  • DOI
    10.1109/HST.2009.5224966
  • Filename
    5224966