Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability
Top Cited Papers
- 1 September 2015
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Security analysis of logic obfuscationPublished by Association for Computing Machinery (ACM) ,2012
- High Quality Test Pattern Generation and Boolean SatisfiabilityPublished by Springer Science and Business Media LLC ,2012
- Security against hardware Trojan through a novel application of design obfuscationPublished by Association for Computing Machinery (ACM) ,2009
- Hardware Trojan: Threats and emerging solutionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- MERO: A Statistical Approach for Hardware Trojan DetectionLecture Notes in Computer Science, 2009
- A region based approach for the identification of hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Guided test generation for isolation and detection of embedded trojans in icsPublished by Association for Computing Machinery (ACM) ,2008
- A genetic algorithm framework for test generationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1997
- HOPE: an efficient parallel fault simulator for synchronous sequential circuitsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1996