Difference between revisions of "Wei2012provably"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
|url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6386729 | |url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6386729 | ||
|abstract=<p>This paper proposes a novel minimal test point insertion methodology that provisions a provably complete detection of hardware Trojans by noninvasive timing characterization. The objective of test point insertion is to break the reconvergent paths so that target routes for Trojan delay testing are specifically observed. We create a satisfiability-based input vector selection for sensitizing and characterizing each single timing path. Evaluations on benchmark circuits demonstrate that the test point-based Trojan detection can cover all circuit locations and can detect Trojans accurately with less than 5\% performance overhead.</p> | |abstract=<p>This paper proposes a novel minimal test point insertion methodology that provisions a provably complete detection of hardware Trojans by noninvasive timing characterization. The objective of test point insertion is to break the reconvergent paths so that target routes for Trojan delay testing are specifically observed. We create a satisfiability-based input vector selection for sensitizing and characterizing each single timing path. Evaluations on benchmark circuits demonstrate that the test point-based Trojan detection can cover all circuit locations and can detect Trojans accurately with less than 5\% performance overhead.</p> | ||
|month=11 | |||
|year=2012 | |||
|booktitle=IEEE/ACM International Conference on Computer-Aided Design (ICCAD) | |booktitle=IEEE/ACM International Conference on Computer-Aided Design (ICCAD) | ||
|title=Provably Complete Hardware Trojan Detection Using Test Point Insertion | |title=Provably Complete Hardware Trojan Detection Using Test Point Insertion | ||
|entry=inproceedings | |entry=inproceedings | ||
| | |pdf=Wei2012provably.pdf | ||
}} | }} |
Latest revision as of 17:40, 9 November 2021
Wei2012provably | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Sheng Wei and Kai Li and Farinaz Koushanfar and Potkonjak, Miodrag |
booktitle | IEEE/ACM International Conference on Computer-Aided Design (ICCAD) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 11 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | Provably Complete Hardware Trojan Detection Using Test Point Insertion |
type | |
volume | |
year | 2012 |
doi | |
issn | |
isbn | |
url | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6386729 |
Wei2012provably.pdf |