On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation
- 16 March 2021
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 5 (1), 75-87
- https://doi.org/10.1007/s41635-021-00111-7
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- The Cat and Mouse in Split ManufacturingIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2018
- TrojanGuardPublished by Association for Computing Machinery (ACM) ,2017
- Hardware Trojan Attacks and CountermeasuresPublished by Springer Science and Business Media LLC ,2017
- A Hardware Trojan Circuit Detection Method Using Activation Sequence GenerationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Remote Dynamic Clock Reconfiguration Based Attacks on Internet of Things ApplicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Hardware enlightening: No where to hide your Hardware Trojans!Published by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Hardware Trojans classification for gate-level netlists based on machine learningPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Is Split Manufacturing Secure?Published by EDAA ,2013
- A Survey of Hardware Trojan Taxonomy and DetectionIEEE Design & Test of Computers, 2010
- New design strategy for improving hardware Trojan detection and reducing Trojan activation timePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009