Skip to main content

2018 | OriginalPaper | Buchkapitel

7. Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level

verfasst von : Hassan Salmani

Erschienen in: Trusted Digital Circuits

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Addressing hardware Trojans at the layout level has mainly focused on two sets of techniques: some techniques are to prevent hardware Trojan insertion by an untrusted manufacturer, and some other techniques are to improve hardware Trojan detection after circuit manufacturing. This chapters studies some of major work in this area and discusses their effectiveness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat H. Salmani, M. Tehranipoor, J. Plusquellic, A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Trans. Very Large Scale Integr. Syst. 20(1), 112–125 (2012)CrossRef H. Salmani, M. Tehranipoor, J. Plusquellic, A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Trans. Very Large Scale Integr. Syst. 20(1), 112–125 (2012)CrossRef
2.
Zurück zum Zitat H. Salmani, M. Tehranipoor, Layout-aware switching activity localization to enhance hardware Trojan detection. IEEE Trans. Inf. Forensics Secur. 7(1), 76–87 (2012)CrossRef H. Salmani, M. Tehranipoor, Layout-aware switching activity localization to enhance hardware Trojan detection. IEEE Trans. Inf. Forensics Secur. 7(1), 76–87 (2012)CrossRef
3.
Zurück zum Zitat X. Zhang, A. Ferraiuolo, M. Tehranipoor, Detection of trojans using a combined ring oscillator network and off-chip transient power analysis. J. Emerg. Technol. Comput. Syst. 9(3), 25:1–25:20 (2013)CrossRef X. Zhang, A. Ferraiuolo, M. Tehranipoor, Detection of trojans using a combined ring oscillator network and off-chip transient power analysis. J. Emerg. Technol. Comput. Syst. 9(3), 25:1–25:20 (2013)CrossRef
4.
Zurück zum Zitat T.F. Wu, K. Ganesan, Y.A. Hu, H.S.P. Wong, S. Wong, S. Mitra, TPAD: hardware Trojan prevention and detection for trusted integrated circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(4), 521–534 (2016)CrossRef T.F. Wu, K. Ganesan, Y.A. Hu, H.S.P. Wong, S. Wong, S. Mitra, TPAD: hardware Trojan prevention and detection for trusted integrated circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(4), 521–534 (2016)CrossRef
5.
Zurück zum Zitat X. Wang, Y. Zheng, A. Basak, S. Bhunia, IIPS: infrastructure IP for secure SoC design. IEEE Trans. Comput. 64(8), 2226–2238 (2015)MathSciNetCrossRef X. Wang, Y. Zheng, A. Basak, S. Bhunia, IIPS: infrastructure IP for secure SoC design. IEEE Trans. Comput. 64(8), 2226–2238 (2015)MathSciNetCrossRef
6.
Zurück zum Zitat K. Xiao, X. Zhang, M. Tehranipoor, A clock sweeping technique for detecting hardware Trojans impacting circuits delay. IEEE Des. Test 30(2), 26–34 (2013)CrossRef K. Xiao, X. Zhang, M. Tehranipoor, A clock sweeping technique for detecting hardware Trojans impacting circuits delay. IEEE Des. Test 30(2), 26–34 (2013)CrossRef
7.
Zurück zum Zitat X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware trojan detection and isolation using current integration and localized current analysis, in 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems (2008), pp. 87–95 X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware trojan detection and isolation using current integration and localized current analysis, in 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems (2008), pp. 87–95
8.
Zurück zum Zitat B. Cha, S.K. Gupta, Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost, in 2013 Design, Automation Test in Europe Conference Exhibition (DATE) (2013), pp. 1265–1270 B. Cha, S.K. Gupta, Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost, in 2013 Design, Automation Test in Europe Conference Exhibition (DATE) (2013), pp. 1265–1270
9.
Zurück zum Zitat D. Forte, C. Bao, A. Srivastava, Temperature tracking: an innovative run-time approach for hardware Trojan detection, in 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (2013), pp. 532–539 D. Forte, C. Bao, A. Srivastava, Temperature tracking: an innovative run-time approach for hardware Trojan detection, in 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (2013), pp. 532–539
10.
Zurück zum Zitat C. Bao, D. Forte, A. Srivastava, On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1), 49–57 (2016)CrossRef C. Bao, D. Forte, A. Srivastava, On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1), 49–57 (2016)CrossRef
Metadaten
Titel
Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level
verfasst von
Hassan Salmani
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-79081-7_7

Neuer Inhalt