A Microprocessor Protection Architecture against Hardware Trojans in Memories

被引:0
|
作者
Bolat, Alperen [1 ]
Cassano, Luca [2 ]
Reviriego, Pedro [3 ]
Ergin, Oguz [1 ]
Ottavi, Marco [4 ]
机构
[1] TOBB University of Economics and Technology, Turkey
[2] Politecnico di Milano, Italy
[3] Universidad Carlos III de Madrid, Spain
[4] University of Rome Tor Vergata, Italy
关键词
Bloom filters - Data memory - False alarms - Microprocessor protections - Protection architecture - Working frequency;
D O I
暂无
中图分类号
学科分类号
摘要
30
引用
收藏
相关论文
共 50 条
  • [41] Hardware Enlightening: No Where to Hide Your Hardware Trojans!
    Samimi, Mohammad Saleh
    Aerabi, Ehsan
    Kazemi, Zahra
    Fazeli, Mahdi
    Patooghy, Ahmad
    2016 IEEE 22ND INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2016, : 251 - 256
  • [42] HARDWARE PROTECTION AGAINST SOFTWARE PIRACY
    MAUDE, T
    MAUDE, D
    COMMUNICATIONS OF THE ACM, 1984, 27 (09) : 950 - 959
  • [43] Hardware Architecture of Protection Switching Device (PSD)
    Ng, Boonchuan
    Premadi, Aswir
    Arif, Noor Azie Azura Mohd
    Ab-Rahman, Mohammad Syuhaimi
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 1, 2009, : 10 - 14
  • [44] Hardware Trojans in eNVM Neuromorphic Devices
    Wu, Lingxi
    Sreekumar, Rahul
    Sharifi, Rasool
    Skadron, Kevin
    Stan, Mircea R.
    Venkat, Ashish
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [45] Potential Trigger Detection for Hardware Trojans
    Zou, Minhui
    Cui, Xiaotong
    Shi, Liang
    Wu, Kaijie
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (07) : 1384 - 1395
  • [46] An Unsupervised Detection Approach for Hardware Trojans
    Dong, Chen
    Liu, Yulin
    Chen, Jinghui
    Liu, Ximeng
    Guo, Wenzhong
    Chen, Yuzhong
    IEEE ACCESS, 2020, 8 : 158169 - 158183
  • [47] Hardware Trojans Inspired IP Watermarks
    Shayan, Mohammed
    Basu, Kanad
    Karri, Ramesh
    IEEE DESIGN & TEST, 2019, 36 (06) : 72 - 79
  • [48] Can Overclocking Detect Hardware Trojans?
    Meng, Xingyu
    Hassan, Rakibul
    Dinakrrao, Sai Manoj Pudukotai
    Basu, Kanad
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [49] The Novel Design Method of Hardware Trojans
    Wei, Zhengyou
    Feng, Wenfeng
    Li, Lei
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 173 - 176
  • [50] Hard to Detect Combinational Hardware Trojans
    Das, Nilanjana
    Saha, Mousumi
    Sikdar, Biplab K.
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 194 - 198