DocumentCode :
627076
Title :
Practical methods for verifying removal of Trojan stable operating points
Author :
Yen-Ting Wang ; Degang Chen ; Geiger, Randall L.
Author_Institution :
Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA
fYear :
2013
fDate :
19-23 May 2013
Firstpage :
2658
Lastpage :
2661
Abstract :
Several methods that can be used to verify effectiveness of startup circuits in eliminating known stable Trojan operating states will be discussed. It will be shown that some widely used approaches do not guarantee Trojan states have been removed. Some of the methods introduced appear to be more practical to work with than others. These methods can also be used to identify the presence of unknown stable Trojan states in many useful circuits.
Keywords :
integrated circuit design; invasive software; Trojan stable operating points; Trojan states; startup circuits; verifying removal; Generators; Integrated circuit modeling; Loading; Simulation; Transient analysis; Trojan horses; Voltage control; Multiple operating points; Start-up Circuit; Trojan state elimination; equilibrium points; references generators; self-bias generators;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems (ISCAS), 2013 IEEE International Symposium on
Conference_Location :
Beijing
ISSN :
0271-4302
Print_ISBN :
978-1-4673-5760-9
Type :
conf
DOI :
10.1109/ISCAS.2013.6572425
Filename :
6572425
Link To Document :
بازگشت