Hardware Trojans classification based on controllability and observability in gate-level netlist
نویسندگان
چکیده
منابع مشابه
Stealthy Dopant-Level Hardware Trojans
With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...
متن کاملStealthy Dopant-Level Hardware Trojans
In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or criticalinfrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans i...
متن کاملON CONTROLLABILITY AND OBSERVABILITY OF FUZZY CONTROL SYSTEMS
In order to more effectively cope with the real world problems of vagueness, imprecise and subjectivity, fuzzy event systems were proposed recently. In this paper, we investigate the controllability and the observability property of two systems that one of them has fuzzy variables and the other one has fuzzy coefficients and fuzzy variables (fully fuzzy system). Also, sufficient conditions for ...
متن کاملIP protection through gate-level netlist security enhancement
In modern Integrated Circuits (IC) design flow, from specification to chip fabrication, various security threats are emergent. These range from malicious modifications in the design, to the Electronic Design Automation (EDA) tools, during layout or fabrication, or to the packaging. Of particular concern are modifications made to third-party IP cores and commercial off-the-shelf (COTS) chips whe...
متن کاملFormulae relating controllability, observability, and co-observability
We present formulae relating controllability, observability, and co-observability arising in the context of supervisory control of discrete event systems. Given a discrete event plant G with event set Σ, uncontrollable event set Σui, and observation mask Mi of the ith supervisor, we first show that the infimal prefix-closed, (L(G), ⋂ i Σui)controllable, and (L(G),Σui,Mi)–co-observable superlang...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Electronics Express
سال: 2017
ISSN: 1349-2543
DOI: 10.1587/elex.14.20170682