Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
نویسندگان
چکیده
منابع مشابه
Hardware Trojan vulnerability
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single positive feedback loop. By example, it is shown...
متن کاملHardware Trojan Identification and Detection
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...
متن کاملA Hardware Trojan Detection Framework
In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...
متن کاملSequential sympatric speciation across trophic levels.
A major cause for biodiversity may be biodiversity itself. As new species form, they may create new niches for others to exploit, potentially catalyzing a chain reaction of speciation events across trophic levels. We tested for such sequential radiation in the Rhagoletis pomonella (Diptera: Tephritidae) complex, a model for sympatric speciation via host plant shifting. We report that the parasi...
متن کاملHardware Trojan by Hot Carrier Injection
This paper discusses how hot carrier injection (HCI) can be exploited to create a trojan that will cause hardware failures. The trojan is produced not via additional logic circuitry but by controlled scenarios that maximize and accelerate the HCI effect in transistors. These scenarios range from manipulating the manufacturing process to varying the internal voltage distribution. This new type o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET Circuits, Devices & Systems
سال: 2021
ISSN: 1751-858X,1751-8598
DOI: 10.1049/cds2.12088