DocumentCode :
3578420
Title :
A novel technique for defending hardware Trojan circuit
Author :
Zhiqiang Zhao ; Gaigai Yang ; Lei Li ; Zhen Li ; Jia Li
Author_Institution :
Res. Inst. Electron. Since & Technol., UESTC, Chengdu, China
fYear :
2014
Firstpage :
357
Lastpage :
360
Abstract :
Hardware security to ensure trust in IC has emerged as important research topic in recent years, several Trojan detection approaches have been developed to prevent the damages caused by Trojans, making Trojan insertion more and more difficult. This paper design Trojans use a novel technique, which can avoid activate Hardware Trojan in testing time. The simulation results on s38584 benchmark demonstrate that, with a negligible area overhead and power consume, our proposed method can significantly reduce the probability of Trojan detection.
Keywords :
electronic engineering computing; integrated circuit design; integrated circuit testing; invasive software; logic design; activate Hardware Trojan; hardware Trojan circuit; hardware security; s38584 benchmark; testing time; Conferences; Hardware; Integrated circuits; Latches; Logic gates; Payloads; Trojan horses; Trojan activation time; hardware Trojan; latch structure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Problem-Solving (ICCP), 2014 IEEE International Conference on
Print_ISBN :
978-1-4799-4246-6
Type :
conf
DOI :
10.1109/ICCPS.2014.7062293
Filename :
7062293
Link To Document :
بازگشت