A Survey of Hardware Trojan Taxonomy and Detection
- 5 February 2010
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Design & Test of Computers
- Vol. 27 (1), 10-25
- https://doi.org/10.1109/mdt.2010.7
Abstract
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.Keywords
This publication has 23 references indexed in Scilit:
- Consistency-based characterization for IC Trojan detectionPublished by Association for Computing Machinery (ACM) ,2009
- Hardware Trojan horse detection using gate-level characterizationPublished by Association for Computing Machinery (ACM) ,2009
- Techniques for Design and Implementation of Secure Reconfigurable PUFsACM Transactions on Reconfigurable Technology and Systems, 2009
- Randomization Based Probabilistic Approach to Detect Trojan CircuitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Power supply signal calibration techniques for improving detection resolution to hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Testing Techniques for Hardware SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- A region based approach for the identification of hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Trojan Detection using IC FingerprintingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Trusted design in FPGAsProceedings of the 39th conference on Design automation - DAC '02, 2007
- Identification and authentication of integrated circuitsConcurrency and Computation: Practice and Experience, 2004