Simulation based hardware trojan detection using path delay analysis

G Vinod, SR Ramesh, M Nirmala Devi - Inventive Communication and …, 2022 - Springer
The expansion of the semiconductor industry has made integrated circuits (ICs) more
vulnerable to deliberate design alterations. An insertion of extra circuitry or an intentional …

A side-channel analysis for hardware Trojan detection based on path delay measurement

A Amelian, SE Borujeni - Journal of Circuits, Systems and …, 2018 - World Scientific
Hardware Trojan Horses (HTHs) are malicious modifications inserted in Integrated Circuit
during fabrication steps. The HTHs are very small and can cause damages in circuit …

A MUX based Latch Technique for the detection of HardwareTrojan using Path Delay Analysis

S Giridharan, SR Ramesh… - 2021 IEEE international …, 2021 - ieeexplore.ieee.org
The security in several applications like military, space related applications etc. is the
important factor that one must ensure, similar to software trojans (virus) there exists …

An Efficient Approach for Hardware Trojan Detection Based on Side-Channel Analysis

SK Tiwari, SR Ramesh - 2023 IEEE 20th India Council …, 2023 - ieeexplore.ieee.org
System security has historically been correlated with the security of the data being handled.
Hardware Trojans are pieces of hardware that are concealed inside a more substantial …

Hardware Trojan detection based on correlated path delays in defiance of variations with spatial correlations

FN Esirci, AA Bayrakci - Design, Automation & Test in Europe …, 2017 - ieeexplore.ieee.org
Hardware Trojan (HT) detection methods based on the side channel analysis deeply suffer
from the process variations. In order to suppress the effect of the variations, we devise a …

Hardware trojan detection technique using frequency characteristic analysis of path delay in application specific integrated circuits

HT Tran, P Van Hoang, TN Do, DH Nguyen - Journal of Science and …, 2019 - isj.vn
Since the last decade, hardware Trojan (HT) have become a serious problem for hardware
security because of outsourcing trends in Integrated Circuit (IC) manufacturing. As the …

Hardware trojan detection techniques using side-channel analysis

TT Hoang, TH Tran, VP Hoang… - 2019 6th NAFOSTED …, 2019 - ieeexplore.ieee.org
Hardware Trojan (HT) is a malicious modification of the integrated circuits during design or
fabrication processes. It can extract the secret information or change the circuit behavior …

Hardware Trojan detection using the order of path delay

X Cui, E Koopahi, K Wu, R Karri - ACM Journal on Emerging …, 2018 - dl.acm.org
Many fabrication-less design houses are outsourcing their designs to third-party foundries
for fabrication to lower cost. This IC development process, however, raises serious security …

How logic masking can improve path delay analysis for Hardware Trojan detection

A Nejat, D Hely, V Beroulle - 2016 IEEE 34th International …, 2016 - ieeexplore.ieee.org
Hardware Trojan (HT), Integrated Circuit (IC) piracy, and overproduction are three important
threats which may happen in untrusted foundries. Modifying structurally the IC design at …

Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …