Using Approximate Circuits Against Hardware Trojans

نویسندگان

چکیده

Editor’s notes: Approximate computing is almost always associated with results showing a tradeoff between accuracy and computational efficiency. In this article, however, approximate finds application in hardware trustworthiness encouraging results. —Mario Barbareschi, University of Naples Federico II

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stealthy Dopant-Level Hardware Trojans

With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...

متن کامل

Stealthy Dopant-Level Hardware Trojans

In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or criticalinfrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans i...

متن کامل

Hardware Trojans - A Systemic Threat

Hardware trojans are a systemic threat that can impact the operations and infrastructure of corporations and government organisations. In this paper, we evaluate a credible and organisation-wide hardware trojan threat from compromised network cards. Our research examines the systemic threat of hardware trojans with an actual hardware trojan implementation to evaluate the impact. Our hardware tr...

متن کامل

Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip

A novel approach for mitigation of hardware Trojan in Systems on Chip (SoC) is presented. With the assumption that Trojans can cause harm only when they are activated, the goal is to avoid cumbersome and sometimes destructive pre-fabrication and pre-deployment tests for Trojans in SoCs, by building systems capable of capturing Trojan activation or simply nullifying their effect at run-time to p...

متن کامل

Private Circuits: Securing Hardware against Probing Attacks

Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access a bounded number of wires in the circuit. This question is motivated by side channel attacks, which allow an adversary to gain partial access to the inner workings of hardware. Recent work has shown that side channel ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE design & test

سال: 2023

ISSN: ['2168-2364', '2168-2356']

DOI: https://doi.org/10.1109/mdat.2021.3117741