Difference between revisions of "Wei2012hardware"

From ACES

(Import from BibTeX)
 
m (Default pdf)
 
(One intermediate revision by the same user not shown)
Line 4: Line 4:
|keywords=benchmark, gate-level characterization, Hardware Trojan, process variation
|keywords=benchmark, gate-level characterization, Hardware Trojan, process variation
|abstract=<p>This paper proposes Hardware Trojan (HT) placement techniques that yield challenging HT detection benchmarks. We develop three types of one-gate HT benchmarks based on switching power, leakage power, and delay measurements that are commonly used in HT detection. In particular, we employ an iterative searching algorithm to find rarely switching locations, an aging-based approach to create ultralow power HT, and a backtracking-based reconvergence identification method to determine the non-observable delay paths. The simulation results indicate that our HT attack benchmarks provide the most challenging representative test cases for the evaluation of side-channel based HT detection techniques.</p>
|abstract=<p>This paper proposes Hardware Trojan (HT) placement techniques that yield challenging HT detection benchmarks. We develop three types of one-gate HT benchmarks based on switching power, leakage power, and delay measurements that are commonly used in HT detection. In particular, we employ an iterative searching algorithm to find rarely switching locations, an aging-based approach to create ultralow power HT, and a backtracking-based reconvergence identification method to determine the non-observable delay paths. The simulation results indicate that our HT attack benchmarks provide the most challenging representative test cases for the evaluation of side-channel based HT detection techniques.</p>
|month=6
|year=2012
|booktitle=Design Automation Conference (DAC)
|booktitle=Design Automation Conference (DAC)
|title=Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry
|title=Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry
|entry=inproceedings
|entry=inproceedings
|date=2012-Ju-01
|pdf=Wei2012hardware.pdf
}}
}}

Latest revision as of 17:40, 9 November 2021

Wei2012hardware
entryinproceedings
address
annote
authorSheng Wei and Kai Li and Farinaz Koushanfar and Potkonjak, Miodrag
booktitleDesign Automation Conference (DAC)
chapter
edition
editor
howpublished
institution
journal
month6
note
number
organization
pages
publisher
school
series
titleHardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry
type
volume
year2012
doi
issn
isbn
urlhttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6241495
pdfWei2012hardware.pdf

File:Wei2012hardware.pdf

Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093