Review on Hardware Trojan Detection Techniques

被引:1
|
作者
Naveenkumar, R. [1 ,2 ]
Sivamangai, N. M. [1 ]
Napolean, A. [1 ]
Sathayapriya, S. Sridevi [1 ]
机构
[1] Karunya Inst Technol & Sci, Dept ECE, Coimbatore 641114, Tamilnadu, India
[2] Karpagam Acad Higher Educ, Dept ECE, Coimbatore 641021, India
来源
关键词
Hardware trojan; Hardware security; Reliability; Pre-silicon detection; And Post-silicon detections;
D O I
10.1007/s40009-023-01247-6
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As a result of globalization, chip design and manufacturing are becoming more susceptible to harmful actions and modifications. However, to develop a reliable and effective system there should be no role of hardware Trojan. In microelectronic systems, hardware security plays a vital role. Hardware security as a discipline originated out of cryptography and involves hardware design, and secure multi-party computations. Hardware Trojan (HT) is a major threat to hardware security because HT can change the circuit's behavior and leak the information, once it is activated. To improve the reliability of the system and the trust of the circuits HT should be detected. This paper deals with various hardware trojan identification like pre-silicon design stage-based detections and post-silicon fabrication stage-based detections.
引用
收藏
页码:521 / 524
页数:4
相关论文
共 50 条
  • [1] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    [J]. National Academy Science Letters, 2023, 46 : 521 - 524
  • [2] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [3] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362
  • [4] Machine Learning for Hardware Trojan Detection: A Review
    Liakos, Konstantinos G.
    Georgakilas, Georgios K.
    Moustakidis, Serafeim
    Karlsson, Patrik
    Plessas, Fotis C.
    [J]. 2019 PANHELLENIC CONFERENCE ON ELECTRONICS AND TELECOMMUNICATIONS (PACET2019), 2019, : 139 - 144
  • [5] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [6] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    [J]. Introduction to Hardw. Secty. and Trust, (339-364):
  • [7] Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques
    Elnaggar, Rana
    Chakrabarty, Krishnendu
    Tahoori, Mehdi B.
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2706 - 2719
  • [8] A method of hardware-trojan detection using design verification techniques
    Graduate school of Engineering, Oita University, 700 Dannoharu, Oita
    870-1192, Japan
    不详
    870-1192, Japan
    [J]. Adv. Intell. Sys. Comput., (978-987):
  • [9] A Method of Hardware-Trojan Detection Using Design Verification Techniques
    Hiramoto, Yushiro
    Ohtake, Satoshi
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987
  • [10] Hardware Trojan Detection Techniques Using Side-Channel Analysis
    Thi-Tam Hoang
    Thai-Ha Tran
    Van-Phuc Hoang
    Xuan-Nam Tran
    Cong-Kha Pham
    [J]. PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 528 - 533