Effective hardware trojan detection using front-end compressive sensing

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Hardware Trojans (HT) have become a serious security concern for semiconductor industries due to the rise in outsourcing of the fabrication of ICs. Fabrication foundries with minimal security pave an easy way for the adversary to tamper the IC design and place a malicious circuit of his interest into the IC. Detection of these malicious circuits is also becoming increasingly difficult due to a large variety of trojans, increase in their complexity and their stealthy nature. An effective Hardware Trojan detection algorithm using a signal processing technique called Compressive Sensing (CS) is proposed in this work. This method mainly focuses on test vector reduction which greatly reduces the test time during the detection process. This compression of test vectors is done using Compressive Sensing (CS). Key nodes in the selected ISCAS ’85 circuits are identified by computing Transition Probability (TP) of each node in the circuit. The circuits with trojans inserted in the key nodes are subjected to further non-destructive analyses to detect the presence of trojan(s). Also, metrics such as True Positive Rate (TPR) and Probability of Detection (PD) are validated to analyse the efficiency of the proposed algorithm

Cite

CITATION STYLE

APA

Nandhini, A. P., Sai Bhavani, M., Dharani Dharan, S., Harish, N., & Priyatharishini, M. (2019). Effective hardware trojan detection using front-end compressive sensing. In Communications in Computer and Information Science (Vol. 969, pp. 271–277). Springer Verlag. https://doi.org/10.1007/978-981-13-5826-5_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free