A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs
- 27 August 2020
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 4 (3), 246-262
- https://doi.org/10.1007/s41635-020-00100-2
Abstract
No abstract availableKeywords
This publication has 45 references indexed in Scilit:
- Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean SatisfiabilityPublished by Springer Science and Business Media LLC ,2015
- Detecting malicious modifications of data in third-party intellectual property coresPublished by Association for Computing Machinery (ACM) ,2015
- Hardware Trojan Detection for Gate-level ICs Using Signal Correlation Based ClusteringPublished by EDAA ,2015
- Reverse Engineering Digital Circuits Using Structural and Functional AnalysesIEEE Transactions on Emerging Topics in Computing, 2013
- MERO: A Statistical Approach for Hardware Trojan DetectionLecture Notes in Computer Science, 2009
- Guided test generation for isolation and detection of embedded trojans in icsPublished by Association for Computing Machinery (ACM) ,2008
- A Very Compact S-Box for AESLecture Notes in Computer Science, 2005
- Low-power weighted random pattern testingIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2000
- Estimation of signal transition activity in FIR filters implemented by a MAC architectureIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2000
- Analytical estimation of signal transition activity from word-level statisticsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1997