Thumbnail
Access Restriction
Subscribed

Author Salmani, H. ♦ Tehranipoor, M.
Sponsorship IEEE Comput. Soc.
Source IEEE Xplore Digital Library
Content type Text
Publisher Institute of Electrical and Electronics Engineers, Inc. (IEEE)
File Format PDF
Copyright Year ©2013
Language English
Subject Domain (in DDC) Natural sciences & mathematics ♦ Physics ♦ Electricity & electronics ♦ Technology ♦ Engineering & allied operations ♦ Applied physics
Subject Keyword Trojan horses ♦ Observability ♦ Benchmark testing ♦ Hardware ♦ Algorithm design and analysis ♦ Very large scale integration ♦ Discrete Fourier transforms
Abstract Considerable attention has been paid to hardware Trojan detection and prevention. However, there is no existing systematic approach to investigate circuit vulnerability to hardware Trojan insertion during development. We present such an approach to investigate circuit vulnerability to Trojan insertion at the behavioral level. This novel vulnerability analysis determines a circuit's susceptibility to Trojan insertion based on statement hardness analysis as well as observability of circuit signals. Further, the Trojan detectability metric is introduced to quantitatively compare the detectability of behavioral Trojans inserted into different circuits. This creates a fair comparison for analyzing the strengths and weaknesses of Trojan detection techniques as well as helping verify trustworthiness of a third party Intellectual Property (IP).
Description Author affiliation: Electr. & Comput. Eng, Univ. of Connecticut, Storrs, CT, USA (Salmani, H.; Tehranipoor, M.)
ISSN 15505774
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research ♦ Reading
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2013-10-02
Publisher Place USA
Rights Holder Institute of Electrical and Electronics Engineers, Inc. (IEEE)
e-ISBN 9781479915859
Size (in Bytes) 253.48 kB
Page Count 6
Starting Page 190
Ending Page 195


Source: IEEE Xplore Digital Library