Intended malicious modification in the integrated circuits is referred to as Hardware Trojans, which has emerged as major security threat. The earlier approach, to keep check to these threats, like logic testing also known as functional testing is proved to be no longer effective for detecting large sequential Trojans which are very rarely triggered. Side channel analysis has been an effective approach for detection of such large sequential Trojans but the increasing process variations and decreasing Trojan size resulted in the reduction of Trojan detection sensitivity using this approach. All these approaches also require golden IC. In this paper, we propose leakage power analysis approach which does not require golden IC and the issue of process variations does not affect the detection sensitivity.
CITATION STYLE
Vaddi, E., Gaddam, K., Maniam, R. K., Mallavajjala, S. A., Dasari, S., & M, N. D. (2015). Detection and diagnosis of hardware trojan using power analysis. In Communications in Computer and Information Science (Vol. 536, pp. 519–529). Springer Verlag. https://doi.org/10.1007/978-3-319-22915-7_47
Mendeley helps you to discover research relevant for your work.