Temperature-aware microarchitecture: Modeling and implementation
ACM Transactions on Architecture and Code Optimization (TACO)
The Impact of Technology Scaling on Lifetime Reliability
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Accurate Temperature Estimation for Efficient Thermal Management
ISQED '08 Proceedings of the 9th international symposium on Quality Electronic Design
At-speed delay characterization for IC authentication and Trojan Horse detection
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Integrated circuit security: new threats and solutions
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Accurate temperature estimation using noisy thermal sensors
Proceedings of the 46th Annual Design Automation Conference
A Survey of Hardware Trojan Taxonomy and Detection
IEEE Design & Test
A statistical framework for designing on-chip thermal sensing infrastructure in nano-scale systems
Proceedings of the 19th international symposium on Physical design
On-chip sensor-driven efficient thermal profile estimation algorithms
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Adaptive and autonomous thermal tracking for high performance computing systems
Proceedings of the 47th Design Automation Conference
Energy and thermal-aware video coding via encoder/decoder workload balancing
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
CMOS VLSI Design: A Circuits and Systems Perspective
CMOS VLSI Design: A Circuits and Systems Perspective
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Optimal Estimation of Dynamic Systems, Second Edition (Chapman & Hall/CRC Applied Mathematics & Nonlinear Science)
Leakage-aware Kalman filter for accurate temperature tracking
IGCC '11 Proceedings of the 2011 International Green Computing Conference and Workshops
Statistical characterization of chip power behavior at post-fabrication stage
IGCC '11 Proceedings of the 2011 International Green Computing Conference and Workshops
A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection
IEEE Transactions on Information Forensics and Security
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry
Proceedings of the 49th Annual Design Automation Conference
A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
High-sensitivity hardware trojan detection using multimodal characterization
Proceedings of the Conference on Design, Automation and Test in Europe
Hi-index | 0.00 |
The hardware Trojan threat has motivated development of Trojan detection schemes at all stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on ICs at test-time, there are many unique advantages offered by post-deployment/run-time Trojan detection. However, run-time approaches have been underutilized with prior work highlighting the challenges of implementing them with limited hardware resources. In this paper, we propose innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation. Simulation results using state-of-the-art tools on publicly available Trojan benchmarks verify that our approaches can detect active Trojans quickly and with few false positives.