The Community for Technology Leaders
Green Image
The vulnerabilities in today’s design and fabrication process have raised the possibility of malicious circuit insertion into a design to impact the functionality or transmit key information to the adversary. Such malicious circuits are known as Trojans. Hardware Trojan detection problem has gained significant attention over the past few years. In this article the authors provide a detailed overview and analysis of the current state of knowledge in this area.
Hardware, Fabrication, Process design, Information security, Application specific integrated circuits, Field programmable gate arrays, Integrated circuit modeling, Semiconductor device manufacture, Design automation,IC Authentication, BIST, Yield, Self-Testing, Profit, Manufacturing Cost, Fault Tolerance, delay testing, B Hardware, B.6.1.g Sequential circuits, B.6.3.c Optimization, B.7.1.i VLSI, B.8.1 Reliability, Testing, and Fault-Tolerance, B.9.2 Energy-aware systems, B.1.3 Control Structure Reliability, Testing, and Fault-Tolerance, B.5 Register-Transfer-Level Implementation, B Hardware, B.6.2 Reliability and Testing, Hardware Security and Trust
"A Survey of Hardware Trojan Taxonomy and Detection", IEEE Design & Test of Computers, vol. , no. , pp. 1, 5555, doi:10.1109/MDT.2009.159
83 ms
(Ver 3.3 (11022016))