A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay
Top Cited Papers
- 7 March 2013
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Design & Test
- Vol. 30 (2), 26-34
- https://doi.org/10.1109/mdat.2013.2249555
Abstract
Clock sweeping can be used to generate signatures for the purpose of detecting hardware Trojans. With the help of simulations and FPGA results, this article demonstrates the effectiveness of their proposed clock-sweeping technique under process variations, even for Trojans as small as a few gates.Keywords
This publication has 9 references indexed in Scilit:
- Critical path analysis in data-driven asynchronous pipelinesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Trustworthy Hardware: Identifying and Classifying Hardware TrojansComputer, 2010
- A Survey of Hardware Trojan Taxonomy and DetectionIEEE Design & Test of Computers, 2010
- A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental ConditionsIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2009
- New design strategy for improving hardware Trojan detection and reducing Trojan activation timePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Detecting malicious inclusions in secure hardware: Challenges and solutionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Towards Trojan-Free Trusted ICs: Problem Analysis and Detection SchemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Trojan Detection using IC FingerprintingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Modern Multidimensional ScalingPublished by Springer Science and Business Media LLC ,1997