Difference between revisions of "Alkabani2009consistency"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 4: | Line 4: | ||
|abstract=<p>A Trojan attack maliciously modifies, alters, or embeds unplanned components inside the exploited chips. Given the original chip specifications, and process and simulation models, the goal of Trojan detection is to identify the malicious components. This paper introduces a new Trojan detection method based on nonintrusive external IC quiescent current measurements. We define a new metric called consistency. Based on the consistency metric and properties of the objective function, we present a robust estimation method that estimates the gate properties while simultaneously detecting the Trojans. Experimental evaluations on standard benchmark designs show the validity of the metric, and demonstrate the effectiveness of the new Trojan detection.</p> | |abstract=<p>A Trojan attack maliciously modifies, alters, or embeds unplanned components inside the exploited chips. Given the original chip specifications, and process and simulation models, the goal of Trojan detection is to identify the malicious components. This paper introduces a new Trojan detection method based on nonintrusive external IC quiescent current measurements. We define a new metric called consistency. Based on the consistency metric and properties of the objective function, we present a robust estimation method that estimates the gate properties while simultaneously detecting the Trojans. Experimental evaluations on standard benchmark designs show the validity of the metric, and demonstrate the effectiveness of the new Trojan detection.</p> | ||
|pages=123-127 | |pages=123-127 | ||
|month= | |||
|year=2009 | |||
|booktitle=IEEE/ACM International Conference on Computer Aided Design (ICCAD) | |booktitle=IEEE/ACM International Conference on Computer Aided Design (ICCAD) | ||
|title=Consistency-based characterization for IC Trojan detection | |title=Consistency-based characterization for IC Trojan detection | ||
|entry=inproceedings | |entry=inproceedings | ||
| | |pdf=Alkabani2009consistency.pdf | ||
}} | }} |
Latest revision as of 17:33, 9 November 2021
Alkabani2009consistency | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Y. Alkabani and Farinaz Koushanfar |
booktitle | IEEE/ACM International Conference on Computer Aided Design (ICCAD) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | |
note | |
number | |
organization | |
pages | 123-127 |
publisher | |
school | |
series | |
title | Consistency-based characterization for IC Trojan detection |
type | |
volume | |
year | 2009 |
doi | |
issn | |
isbn | |
url | http://doi.acm.org/10.1145/1687399.1687426 |
Alkabani2009consistency.pdf |