The Community for Technology Leaders
Green Image
Issue No. 02 - April (2013 vol. 30)
ISSN: 0740-7475
pp: 26-34
Kan Xiao , ECE Dept., Univ. of Connecticut, Storrs, CT, USA
Xuehui Zhang , ECE Dept., Univ. of Connecticut, Storrs, CT, USA
Mohammad Tehranipoor , ECE Dept., Univ. of Connecticut, Storrs, CT, USA
Clock sweeping can be used to generate signatures for the purpose of detecting hardware Trojans. With the help of simulations and FPGA results, this article demonstrates the effectiveness of their proposed clock-sweeping technique under process variations, even for Trojans as small as a few gates.
invasive software, clocks, delay circuits, digital signatures, field programmable gate arrays, process variation, circuit delay, signature, hardware Trojan detection, FPGA, clock-sweeping technique, Trojan horses, Computer security, Delays, Payloads, Logic gates, Integrated circuits, Synchronization, Circuit layout, outlier analysis, Hardware Trojan, delay-based detection, clock sweeping, process variation, multidimensional scaling

Kan Xiao, Xuehui Zhang and M. Tehranipoor, "A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay," in IEEE Design & Test of Computers, vol. 30, no. , pp. 26-34, 2013.
180 ms
(Ver 3.3 (11022016))