메뉴 건너뛰기




Volumn 31, Issue 1, 2015, Pages 11-26

Detecting Hardware Trojans using On-chip Sensors in an ASIC Design

Author keywords

Hardware Trojan detection; Low voltage testing; On chip sensors; Ring oscillator network

Indexed keywords

APPLICATION SPECIFIC INTEGRATED CIRCUITS; INTEGRATED CIRCUIT DESIGN; MALWARE; SEMICONDUCTOR DEVICE MANUFACTURE;

EID: 84925483377     PISSN: 09238174     EISSN: 15730727     Source Type: Journal    
DOI: 10.1007/s10836-015-5504-x     Document Type: Article
Times cited : (40)

References (27)
  • 1
    • 34548719905 scopus 로고    scopus 로고
    • Trojan detection using IC Fingerprinting. In: Proc. IEEE symposium on security and privacy
    • Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC Fingerprinting. In: Proc. IEEE symposium on security and privacy, pp 296–310
    • (2007) pp 296–310
    • Agrawal, D.1    Baktir, S.2    Karakoyunlu, D.3    Rohatgi, P.4    Sunar, B.5
  • 2
    • 85067721898 scopus 로고    scopus 로고
    • Digital integrated circuits analysis and design, 2nd edn. CRC Press
    • Ayers JE (2009) Digital integrated circuits analysis and design, 2nd edn. CRC Press, pp 242–248
    • (2009) pp 242–248
    • Ayers, J.E.1
  • 3
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware Trojans. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST)
    • Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 40–47
    • (2008) pp 40–47
    • Banga, M.1    Hsiao, M.S.2
  • 5
    • 51849089785 scopus 로고    scopus 로고
    • On-demand transparency for improving hardware Trojan detectability. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST)
    • Chakraborty RS, Paul S, Bhunia S (2008) On-demand transparency for improving hardware Trojan detectability. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 48–50
    • (2008) pp 48–50
    • Chakraborty, R.S.1    Paul, S.2    Bhunia, S.3
  • 7
    • 51849095999 scopus 로고    scopus 로고
    • Hardware Trojan detection using path delay fingerprint. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST)
    • Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST), pp 51–57
    • (2008) pp 51–57
    • Jin, Y.1    Makris, Y.2
  • 8
    • 58449132326 scopus 로고    scopus 로고
    • Randomization based probabilistic approach to detect Trojan circuits. In: Proc. IEEE high assurance systems engineering symposium (HASE)
    • Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: Proc. IEEE high assurance systems engineering symposium (HASE), pp 117–124
    • (2008) pp 117–124
    • Jha, S.1    Jha, S.K.2
  • 9
    • 0003946510 scopus 로고    scopus 로고
    • Principal component analysis, 2nd edn
    • Jolliffe IT (2002) Principal component analysis, 2nd edn. Springer
    • (2002) Springer
    • Jolliffe, I.T.1
  • 10
    • 77958115258 scopus 로고    scopus 로고
    • Trustworthy hardware: identifying and classifying hardware Trojans
    • Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware Trojans. Computer:39–46
    • (2010) Computer , pp. 39-46
    • Karri, R.1    Rajendran, J.2    Rosenfeld, K.3    Tehranipoor, M.4
  • 11
    • 51849099113 scopus 로고    scopus 로고
    • At-speed delay characterization for IC authentication and Trojan horse detection. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST)
    • Li J, Lach J (2008) At-speed delay characterization for IC authentication and Trojan horse detection. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 8–14
    • (2008) pp 8–14
    • Li, J.1    Lach, J.2
  • 12
    • 77955753636 scopus 로고    scopus 로고
    • Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: Proc. IEEE int. symposium on hardware-oriented security and trust (HOST)
    • Narasimhan S, Du D, Chakraborty RS, Paul S,Wolff F, Papachristou C, Roy K, Bhunia S (2010) Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: Proc. IEEE int. symposium on hardware-oriented security and trust (HOST), pp 13–18
    • (2010) pp 13–18
    • Narasimhan, S.1    Du, D.2    Chakraborty, R.S.3
  • 13
    • 80051985183 scopus 로고    scopus 로고
    • Tesr: a robust temporal self-referencing approach for hardware Trojan detection. In: Proc. IEEE int. symposium on hardware oriented security and trust (HOST)
    • Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011) Tesr: a robust temporal self-referencing approach for hardware Trojan detection. In: Proc. IEEE int. symposium on hardware oriented security and trust (HOST), pp 71–74
    • (2011) pp 71–74
    • Narasimhan, S.1    Wang, X.2    Du, D.3    Chakraborty, R.S.4    Bhunia, S.5
  • 14
    • 0017453547 scopus 로고
    • Convex hulls of finite sets of points in two and three dimensions
    • Preparata FP, Hong SJ (1977) Convex hulls of finite sets of points in two and three dimensions. Commun ACM:87–93
    • (1977) Commun ACM , pp. 87-93
    • Preparata, F.P.1    Hong, S.J.2
  • 15
    • 70350733802 scopus 로고    scopus 로고
    • Hardware Trojan horse detection using gate-level characterization. In: Proc. ACM/IEEE design automation conference (DAC)
    • Potkonjak M, Nahapetian A, Nelson M, Massey T (2009) Hardware Trojan horse detection using gate-level characterization. In: Proc. ACM/IEEE design automation conference (DAC), pp 688–693
    • (2009) pp 688–693
    • Potkonjak, M.1    Nahapetian, A.2    Nelson, M.3    Massey, T.4
  • 16
    • 51849084404 scopus 로고    scopus 로고
    • Sensitivity analysis to hardware Trojans using power supply transient signals. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST)
    • Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware Trojans using power supply transient signals. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 3–7
    • (2008) pp 3–7
    • Rad, R.1    Plusquellic, J.2    Tehranipoor, M.3
  • 17
    • 57849119623 scopus 로고    scopus 로고
    • Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: Proc. IEEE int. conference on computer-aided design (ICCAD)
    • Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008) Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: Proc. IEEE int. conference on computer-aided design (ICCAD), pp 632–639
    • (2008) pp 632–639
    • Rad, R.M.1    Wang, X.2    Tehranipoor, M.3    Plusquellic, J.4
  • 18
    • 83455210245 scopus 로고    scopus 로고
    • Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection. In: Proc. IEEE 29th int. conference on computer design (ICCD)
    • Rilling J, Graziano D, Hitchcock J, Meyer T, Wang X, Jones P, Zambreno J (2011) Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection. In: Proc. IEEE 29th int. conference on computer design (ICCD), pp 289–292
    • (2011) pp 289–292
    • Rilling, J.1    Graziano, D.2    Hitchcock, J.3    Meyer, T.4    Wang, X.5    Jones, P.6    Zambreno, J.7
  • 19
    • 18744370342 scopus 로고    scopus 로고
    • Technical report
    • Report of the defense science board task force on high performace microchip supply (2005) Technical report, US DOD
    • (2005) US DOD
  • 20
    • 70449123838 scopus 로고    scopus 로고
    • New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST)
    • Salmani H, Tehranipoor M, Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST), pp 66–73
    • (2009) pp 66–73
    • Salmani, H.1    Tehranipoor, M.2    Plusquellic, J.3
  • 21
    • 84963778768 scopus 로고    scopus 로고
    • Introduction to hardware security and trust
    • Tehranipoor M, Wang C (2010) Introduction to hardware security and trust. Springer
    • (2010) Springer
    • Tehranipoor, M.1    Wang, C.2
  • 23
    • 51849111151 scopus 로고    scopus 로고
    • Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proc. IEEE workshop on hardware-oriented security and trust (HOST)
    • Wang X, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proc. IEEE workshop on hardware-oriented security and trust (HOST), pp 15–19
    • (2008) pp 15–19
    • Wang, X.1    Tehranipoor, M.2    Plusquellic, J.3
  • 24
    • 67649998710 scopus 로고    scopus 로고
    • Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE int. symposium on defect and fault tolerance of VLSI systems
    • Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE int. symposium on defect and fault tolerance of VLSI systems, pp 87–95
    • (2008) pp 87–95
    • Wang, X.1    Salmani, H.2    Tehranipoor, M.3    Plusquellic, J.4
  • 25
    • 49749105556 scopus 로고    scopus 로고
    • Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proc. DATE
    • Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proc. DATE, pp 1362–1365
    • (2008) pp 1362–1365
    • Wolff, F.1    Papachristou, C.2    Bhunia, S.3    Chakraborty, R.S.4
  • 26
    • 84994100065 scopus 로고    scopus 로고
    • Detection of hardware Trojans using a combined ring oscillator network and off-chip transient power analysis
    • Zhang X, Ferraiuoloand A, Tehranipoor M (2012) Detection of hardware Trojans using a combined ring oscillator network and off-chip transient power analysis. ACM J Emerg Technol Comput Syst (JETC)
    • (2012) ACM J Emerg Technol Comput Syst (JETC)
    • Zhang, X.1    Ferraiuoloand, A.2    Tehranipoor, M.3
  • 27
    • 85067711363 scopus 로고    scopus 로고
    • Ron: an on-chip ring oscillator network for hardware Trojan detection. In: Proc. design, automation test in Europe conference exhibition (DATE)
    • Zhang X, Tehranipoor M (2011) Ron: an on-chip ring oscillator network for hardware Trojan detection. In: Proc. design, automation test in Europe conference exhibition (DATE), pp 1–6
    • (2011) pp 1–6
    • Zhang, X.1    Tehranipoor, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.