The Community for Technology Leaders
RSS Icon
Issue No.02 - April (2013 vol.30)
pp: 35-44
R. Karri , Polytech. Inst., New York Univ., New York, OH, USA
Modification to traditional SoC design flow can enable effective protection against maliciously inserted rogue functionality during design and fabrication. This article presents a joint circuit-architecture-level design approach that helps in preventing or detecting Trojan attacks.
system-on-chip, network synthesis, security, Trojan attack detection, processor, insider attack, circuit microarchitecture codesign approach, modification, SoC design flow, rogue functionality, fabrication, circuit architecture level design, Trojan horses, Program processors, Logic gates, Encryption, Computer security, Hardware, Computer architecture, Hardware security, Hardware-based insider attacks, Logic encryption, Circuit micro-architecture co-design
R. Karri, "Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach", IEEE Design & Test of Computers, vol.30, no. 2, pp. 35-44, April 2013, doi:10.1109/MDAT.2013.2249554
33 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool