首页> 外文会议>International symposium on progress in VLSI design and test >Detection and analysis of hardware trojan using scan chain method
【24h】

Detection and analysis of hardware trojan using scan chain method

机译:扫描链法检测和分析硬件木马

获取原文

摘要

Due to the globalization of the Integrated Circuit manufacturing industry and wide use of third party IP in the modern SoCs has opened the backdoor for Hardware Trojan insertion. The detection of Hardware Trojan is challenging because of its very rare activation mechanism and unpredictable change in the functionality of the system. This paper proposes a new hardware Trojan detection scheme using power analysis and experiments the insertion and detection of hardware Trojan using existing scan chain efficiently in ISCAS'89 benchmark circuits.
机译:由于集成电路制造业的全球化以及现代SoC中第三方IP的广泛使用,为硬件特洛伊木马程序的插入打开了后门。硬件特洛伊木马的检测具有挑战性,因为它的激活机制非常罕见,并且系统功能发生不可预测的变化。本文提出了一种利用功耗分析的新型硬件木马检测方案,并利用现有的扫描链在ISCAS'89基准电路中有效地对硬件木马进行了插入和检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号