Difference between revisions of "Alkabani2009consistency"

From ACES

(Import from BibTeX)
 
m (Default pdf)
 
(One intermediate revision by the same user not shown)
Line 4: Line 4:
|abstract=<p>A Trojan attack maliciously modifies, alters, or embeds unplanned components inside the exploited chips. Given the original chip specifications, and process and simulation models, the goal of Trojan detection is to identify the malicious components. This paper introduces a new Trojan detection method based on nonintrusive external IC quiescent current measurements. We define a new metric called consistency. Based on the consistency metric and properties of the objective function, we present a robust estimation method that estimates the gate properties while simultaneously detecting the Trojans. Experimental evaluations on standard benchmark designs show the validity of the metric, and demonstrate the effectiveness of the new Trojan detection.</p>
|abstract=<p>A Trojan attack maliciously modifies, alters, or embeds unplanned components inside the exploited chips. Given the original chip specifications, and process and simulation models, the goal of Trojan detection is to identify the malicious components. This paper introduces a new Trojan detection method based on nonintrusive external IC quiescent current measurements. We define a new metric called consistency. Based on the consistency metric and properties of the objective function, we present a robust estimation method that estimates the gate properties while simultaneously detecting the Trojans. Experimental evaluations on standard benchmark designs show the validity of the metric, and demonstrate the effectiveness of the new Trojan detection.</p>
|pages=123-127
|pages=123-127
|month=
|year=2009
|booktitle=IEEE/ACM International Conference on Computer Aided Design (ICCAD)
|booktitle=IEEE/ACM International Conference on Computer Aided Design (ICCAD)
|title=Consistency-based characterization for IC Trojan detection
|title=Consistency-based characterization for IC Trojan detection
|entry=inproceedings
|entry=inproceedings
|date=2009-20-01
|pdf=Alkabani2009consistency.pdf
}}
}}

Latest revision as of 17:33, 9 November 2021

Alkabani2009consistency
entryinproceedings
address
annote
authorY. Alkabani and Farinaz Koushanfar
booktitleIEEE/ACM International Conference on Computer Aided Design (ICCAD)
chapter
edition
editor
howpublished
institution
journal
month
note
number
organization
pages123-127
publisher
school
series
titleConsistency-based characterization for IC Trojan detection
type
volume
year2009
doi
issn
isbn
urlhttp://doi.acm.org/10.1145/1687399.1687426
pdfAlkabani2009consistency.pdf

File:Alkabani2009consistency.pdf

Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093