A Scheme for On-Chip Timing Characterization
VTS '06 Proceedings of the 24th IEEE VLSI Test Symposium
Analysis and modeling of CD variation for statistical static timing
Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design
Circuit Failure Prediction and Its Application to Transistor Aging
VTS '07 Proceedings of the 25th IEEE VLSI Test Symmposium
Towards trojan-free trusted ICs: problem analysis and detection scheme
Proceedings of the conference on Design, automation and test in Europe
At-speed delay characterization for IC authentication and Trojan Horse detection
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
A region based approach for the identification of hardware Trojans
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Hardware Trojan detection using path delay fingerprint
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Hardware Trojan horse detection using gate-level characterization
Proceedings of the 46th Annual Design Automation Conference
VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs
HST '09 Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust
Consistency-based characterization for IC Trojan detection
Proceedings of the 2009 International Conference on Computer-Aided Design
A Survey of Hardware Trojan Taxonomy and Detection
IEEE Design & Test
Gate-level characterization: foundations and hardware security applications
Proceedings of the 47th Design Automation Conference
Proceedings of the 47th Design Automation Conference
A unified submodular framework for multimodal IC Trojan detection
IH'10 Proceedings of the 12th international conference on Information hiding
Scalable segmentation-based malicious circuitry detection and diagnosis
Proceedings of the International Conference on Computer-Aided Design
Securing netlist-level FPGA design through exploiting process variation and degradation
Proceedings of the ACM/SIGDA international symposium on Field Programmable Gate Arrays
A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection
IEEE Transactions on Information Forensics and Security
Malicious Circuitry Detection Using Thermal Conditioning
IEEE Transactions on Information Forensics and Security - Part 2
Energy attacks and defense techniques for wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
The undetectable and unprovable hardware trojan horse
Proceedings of the 50th Annual Design Automation Conference
FANCI: identification of stealthy malicious logic using boolean functional analysis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
This paper proposes a novel minimal test point insertion methodology that provisions a provably complete detection of hardware Trojans by noninvasive timing characterization. The objective of test point insertion is to break the reconvergent paths so that target routes for Trojan delay testing are specifically observed. We create a satisfiability-based input vector selection for sensitizing and characterizing each single timing path. Evaluations on benchmark circuits demonstrate that the test point-based Trojan detection can cover all circuit locations and can detect Trojans accurately with less than 5% performance overhead.