Difference between revisions of "Wei2012hardware"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 4: | Line 4: | ||
|keywords=benchmark, gate-level characterization, Hardware Trojan, process variation | |keywords=benchmark, gate-level characterization, Hardware Trojan, process variation | ||
|abstract=<p>This paper proposes Hardware Trojan (HT) placement techniques that yield challenging HT detection benchmarks. We develop three types of one-gate HT benchmarks based on switching power, leakage power, and delay measurements that are commonly used in HT detection. In particular, we employ an iterative searching algorithm to find rarely switching locations, an aging-based approach to create ultralow power HT, and a backtracking-based reconvergence identification method to determine the non-observable delay paths. The simulation results indicate that our HT attack benchmarks provide the most challenging representative test cases for the evaluation of side-channel based HT detection techniques.</p> | |abstract=<p>This paper proposes Hardware Trojan (HT) placement techniques that yield challenging HT detection benchmarks. We develop three types of one-gate HT benchmarks based on switching power, leakage power, and delay measurements that are commonly used in HT detection. In particular, we employ an iterative searching algorithm to find rarely switching locations, an aging-based approach to create ultralow power HT, and a backtracking-based reconvergence identification method to determine the non-observable delay paths. The simulation results indicate that our HT attack benchmarks provide the most challenging representative test cases for the evaluation of side-channel based HT detection techniques.</p> | ||
|month=6 | |||
|year=2012 | |||
|booktitle=Design Automation Conference (DAC) | |booktitle=Design Automation Conference (DAC) | ||
|title=Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry | |title=Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry | ||
|entry=inproceedings | |entry=inproceedings | ||
| | |pdf=Wei2012hardware.pdf | ||
}} | }} |
Latest revision as of 17:40, 9 November 2021
Wei2012hardware | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Sheng Wei and Kai Li and Farinaz Koushanfar and Potkonjak, Miodrag |
booktitle | Design Automation Conference (DAC) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 6 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry |
type | |
volume | |
year | 2012 |
doi | |
issn | |
isbn | |
url | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6241495 |
Wei2012hardware.pdf |