The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - April (2013 vol.30)
pp: 35-44
R. Karri , Polytech. Inst., New York Univ., New York, OH, USA
ABSTRACT
Modification to traditional SoC design flow can enable effective protection against maliciously inserted rogue functionality during design and fabrication. This article presents a joint circuit-architecture-level design approach that helps in preventing or detecting Trojan attacks.
INDEX TERMS
system-on-chip, network synthesis, security, Trojan attack detection, processor, insider attack, circuit microarchitecture codesign approach, modification, SoC design flow, rogue functionality, fabrication, circuit architecture level design, Trojan horses, Program processors, Logic gates, Encryption, Computer security, Hardware, Computer architecture, Hardware security, Hardware-based insider attacks, Logic encryption, Circuit micro-architecture co-design
CITATION
R. Karri, "Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach", IEEE Design & Test of Computers, vol.30, no. 2, pp. 35-44, April 2013, doi:10.1109/MDAT.2013.2249554
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool