DocumentCode :
3171990
Title :
Performance of delay-based Trojan detection techniques under parameter variations
Author :
Rai, Devendra ; Lach, John
Author_Institution :
Charles L. Brown Dept. of Electr. & Comput. Eng., Univ. of Virginia, Charlottesville, VA, USA
fYear :
2009
fDate :
27-27 July 2009
Firstpage :
58
Lastpage :
65
Abstract :
Various schemes utilizing path delay information have been proposed to determine the authenticity of a given integrated circuit. However, the performance of these techniques under parameter variations must be evaluated, as delay variations may mask the delay impact of design alterations, such as hardware Trojan horses. This paper examines how path delay characterization performs under extensive delay variations, and results reveal that it remains a powerful tool for detecting design alterations by leveraging statistical techniques.
Keywords :
integrated circuits; security of data; statistical analysis; delay-based Trojan detection techniques; hardware Trojan horses; integrated circuit; parameter variations; path delay characterization; path delay information; statistical techniques; Clocks; Delay; Displays; Electric variables; Hardware; Integrated circuit interconnections; Invasive software; Manufacturing; Signal processing; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on
Conference_Location :
Francisco, CA
Print_ISBN :
978-1-4244-4805-0
Electronic_ISBN :
978-1-4244-4804-3
Type :
conf
DOI :
10.1109/HST.2009.5224966
Filename :
5224966
Link To Document :
بازگشت