Detection and diagnosis of hardware trojan using power analysis

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intended malicious modification in the integrated circuits is referred to as Hardware Trojans, which has emerged as major security threat. The earlier approach, to keep check to these threats, like logic testing also known as functional testing is proved to be no longer effective for detecting large sequential Trojans which are very rarely triggered. Side channel analysis has been an effective approach for detection of such large sequential Trojans but the increasing process variations and decreasing Trojan size resulted in the reduction of Trojan detection sensitivity using this approach. All these approaches also require golden IC. In this paper, we propose leakage power analysis approach which does not require golden IC and the issue of process variations does not affect the detection sensitivity.

Cite

CITATION STYLE

APA

Vaddi, E., Gaddam, K., Maniam, R. K., Mallavajjala, S. A., Dasari, S., & M, N. D. (2015). Detection and diagnosis of hardware trojan using power analysis. In Communications in Computer and Information Science (Vol. 536, pp. 519–529). Springer Verlag. https://doi.org/10.1007/978-3-319-22915-7_47

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free