In-situ Trojan authentication for invalidating hardware-Trojan functions

被引:0
|
作者
机构
[1] Oya, Masaru
[2] Shi, Youhua
[3] Yanagisawa, Masao
[4] Togawa, Nozomu
来源
| 2016年 / IEEE Computer Society卷 / 2016-May期
关键词
713.4 Pulse Circuits - 714.2 Semiconductor Devices and Integrated Circuits - 723 Computer Software; Data Handling and Applications;
D O I
7479192
中图分类号
学科分类号
摘要
22
引用
下载
收藏
相关论文
共 50 条
  • [31] Hardware Trojan for security LSI
    Yoshikawa, M.
    Satoh, R.
    Kumaki, T.
    Digest of Technical Papers - IEEE International Conference on Consumer Electronics, 2013, : 29 - 30
  • [32] Scalable Hardware Trojan Diagnosis
    Wei, Sheng
    Potkonjak, Miodrag
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (06) : 1049 - 1057
  • [33] Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection
    Sarihi, Amin
    Patooghy, Ahmad
    Jamieson, Peter
    Badawy, Abdel-Hameed A.
    arXiv, 2023,
  • [34] Hardware Trojan Testing with Hierarchical Trojan Types Under Cognitive Biases
    Nan, Satyaki
    Brahma, Swastik
    2024 58TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, CISS, 2024,
  • [35] Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection
    Sarihi, Amin
    Patooghy, Ahmad
    Jamieson, Peter
    Badawy, Abdel-Hameed A.
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (10): : 14295 - 14329
  • [36] BISA: Built-In Self-Authentication for Preventing Hardware Trojan Insertion
    Xiao, Kan
    Tehranipoor, Mohammed
    2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2013, : 45 - 50
  • [37] A Sensor-Assisted Self-Authentication Framework for Hardware Trojan Detection
    Davoodi, Azadeh
    Li, Min
    Tehranipoor, Mohammad
    IEEE DESIGN & TEST, 2013, 30 (05) : 74 - 82
  • [38] Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
    Thejaswini, P.
    Vivekananda, G.
    Anu, H.
    Priya, R.
    Prasad, B. S. Krishna
    Nischay, M.
    EMITTER-INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGY, 2022, 10 (02) : 370 - 388
  • [39] A Sensor-Assisted Self-Authentication Framework for Hardware Trojan Detection
    Li, Min
    Davoodi, Azadeh
    Tehranipoor, Mohammad
    DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 1331 - 1336
  • [40] Hardware Trojan Side-Channels Based on Physical Unclonable Functions
    Gong, Zheng
    Makkes, Marc X.
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 294 - 303