Trust Filter: Runtime Hardware Trojan Detection in Behavioral MPSoCs
- 1 March 2017
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 1 (1), 56-67
- https://doi.org/10.1007/s41635-017-0005-2
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- VeriTrust: Verification for Hardware TrustIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015
- A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan DetectionIEEE Transactions on Information Forensics and Security, 2014
- Hardware Trojan Attacks: Threat Analysis and CountermeasuresProceedings of the IEEE, 2014
- S2CBench: Synthesizable SystemC Benchmark Suite for High-Level SynthesisIEEE Embedded Systems Letters, 2014
- Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task schedulingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- High-level synthesis for security and trustPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Protection Against Hardware Trojan Attacks: Towards a Comprehensive SolutionIEEE Design & Test, 2013
- Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module AcquisitionIEEE Transactions on Information Forensics and Security, 2011
- Trustworthy Hardware: Identifying and Classifying Hardware TrojansComputer, 2010
- Trusted RTL: Trojan detection methodology in pre-silicon designsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010