DocumentCode
627076
Title
Practical methods for verifying removal of Trojan stable operating points
Author
Yen-Ting Wang ; Degang Chen ; Geiger, Randall L.
Author_Institution
Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA
fYear
2013
fDate
19-23 May 2013
Firstpage
2658
Lastpage
2661
Abstract
Several methods that can be used to verify effectiveness of startup circuits in eliminating known stable Trojan operating states will be discussed. It will be shown that some widely used approaches do not guarantee Trojan states have been removed. Some of the methods introduced appear to be more practical to work with than others. These methods can also be used to identify the presence of unknown stable Trojan states in many useful circuits.
Keywords
integrated circuit design; invasive software; Trojan stable operating points; Trojan states; startup circuits; verifying removal; Generators; Integrated circuit modeling; Loading; Simulation; Transient analysis; Trojan horses; Voltage control; Multiple operating points; Start-up Circuit; Trojan state elimination; equilibrium points; references generators; self-bias generators;
fLanguage
English
Publisher
ieee
Conference_Titel
Circuits and Systems (ISCAS), 2013 IEEE International Symposium on
Conference_Location
Beijing
ISSN
0271-4302
Print_ISBN
978-1-4673-5760-9
Type
conf
DOI
10.1109/ISCAS.2013.6572425
Filename
6572425
Link To Document