Programs
- M. Tech. in Automotive Engineering -
- Clinical Fellowship in Laboratory Genetics & Genomics - Fellowship
Publication Type : Conference Proceedings
Publisher : Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
Source : Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (2014)
Url : https://ieeexplore.ieee.org/abstract/document/6963036
Keywords : Cryptography, Equations, gate level characterization, Hardware, hardware security, Hardware Trojans, IC Fingerprinting, integrated circuit design, Integrated circuits, invasive software, Leakage power, Linear programming, Logic gates, malicious combinational Hardware Trojan detection, mathematical model, Side Channel Analysis, side-channel parameters, size 90 nm, Trojan horses, Vectors
Campus : Coimbatore
School : School of Engineering
Department : Electronics and Communication
Verified : No
Year : 2014
Abstract : Globalization of Integrated Circuits (IC's) in semiconductor industries has made them vulnerable to intentional alterations of the design. These intentional alterations to a design are called Hardware Trojans (HT's). Since many of the designs are outsourced for its fabrication, there is a lot of chance for altering its functionality. It is very important to detect these Trojans as it may raise serious concern about hardware trust, especially in the field of military and security applications. This paper considers the detection of combinational trojans using Gate Level Characterization (GLC) and is based on the measurement of side-channel parameters, especially leakage power. The leakage power for an entire circuit is being calculated for each input vector. The obtained measurements are formulated as linear equations in Linear Programming (LP) and are solved using LP solver.
Cite this Research Publication : D. K. Karunakaran and N Mohankumar, “Malicious Combinational Hardware Trojan Detection by Gate Level Characterization in 90nm technology”, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT). 2014.