A security method of hardware Trojan detection using path tracking algorithm
Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing. Malicious circuits, also known as hardware Trojans, are found able to degrade the circuit performance or even leak confidential information, a...
Saved in:
| Published in | EURASIP journal on wireless communications and networking Vol. 2022; no. 1; pp. 1 - 21 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Cham
Springer International Publishing
05.09.2022
Springer Nature B.V SpringerOpen |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1687-1499 1687-1472 1687-1499 |
| DOI | 10.1186/s13638-022-02165-9 |
Cover
| Summary: | Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing. Malicious circuits, also known as hardware Trojans, are found able to degrade the circuit performance or even leak confidential information, and accordingly it is definitely an issue of immediate concern to develop detection techniques against hardware Trojans. This paper presents a ring oscillator-based detection technique to improve the hardware Trojan detection performance. A circuit under test is divided into a great number of blocks, path assignment is optimized using a path tracking algorithm, and a high coverage is reached accordingly. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1687-1499 1687-1472 1687-1499 |
| DOI: | 10.1186/s13638-022-02165-9 |