Power-side channel attacks use the amount of power consumption and transient/dynamic current leakage to attack the design. A device like an oscilloscope can be used to collect power traces, and those traces are statistically analyzed using correlation analysis to...
CITATION STYLE
Farahmandi, F., Huang, Y., & Mishra, P. (2020). Hardware Trojan Detection Schemes Using Path Delay and Side-Channel Analysis. In System-on-Chip Security (pp. 221–271). Springer International Publishing. https://doi.org/10.1007/978-3-030-30596-3_11
Mendeley helps you to discover research relevant for your work.