Difference between revisions of "Koushanfar2010a"
From ACES
(Import from BibTeX) |
m (Import from BibTeX) |
||
Line 4: | Line 4: | ||
|keywords=Change detection algorithms, circuit Trojan detection, gate-level characterization, hardware malware detection, hardware security and trust, submodular functions, timing/power tests. | |keywords=Change detection algorithms, circuit Trojan detection, gate-level characterization, hardware malware detection, hardware security and trust, submodular functions, timing/power tests. | ||
|abstract=<p>This paper presents a unified formal framework for integrated circuits (IC) Trojan detection that can simultaneously employ multiple noninvasive measurement types. Hardware Trojans refer to modifications, alterations, or insertions to the original IC for adversarial purposes. The new framework formally defines the IC Trojan detection for each measurement type as an optimization problem and discusses the complexity. A formulation of the problem that is applicable to a large class of Trojan detection problems and is submodular is devised. Based on the objective function properties, an efficient Trojan detection method with strong approximation and optimality guarantees is introduced. Signal processing methods for calibrating the impact of inter-chip and intra-chip correlations are presented. We propose a number of methods for combining the detections of the different measurement types. Experimental evaluations on benchmark designs reveal the low-overhead and effectiveness of the new Trojan detection framework and provides a comparison of different detection combining methods.</p> | |abstract=<p>This paper presents a unified formal framework for integrated circuits (IC) Trojan detection that can simultaneously employ multiple noninvasive measurement types. Hardware Trojans refer to modifications, alterations, or insertions to the original IC for adversarial purposes. The new framework formally defines the IC Trojan detection for each measurement type as an optimization problem and discusses the complexity. A formulation of the problem that is applicable to a large class of Trojan detection problems and is submodular is devised. Based on the objective function properties, an efficient Trojan detection method with strong approximation and optimality guarantees is introduced. Signal processing methods for calibrating the impact of inter-chip and intra-chip correlations are presented. We propose a number of methods for combining the detections of the different measurement types. Experimental evaluations on benchmark designs reveal the low-overhead and effectiveness of the new Trojan detection framework and provides a comparison of different detection combining methods.</p> | ||
|month=5 | |||
|year=2010 | |||
|booktitle=Information Hiding Conference | |booktitle=Information Hiding Conference | ||
|title=A unified framework for multimodal submodular IC trojan detection | |title=A unified framework for multimodal submodular IC trojan detection | ||
|entry=inproceedings | |entry=inproceedings | ||
}} | }} |
Revision as of 03:38, 4 September 2021
Koushanfar2010a | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Farinaz Koushanfar and Azalia Mirhoseini and Y. Alkabani |
booktitle | Information Hiding Conference |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 5 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | A unified framework for multimodal submodular IC trojan detection |
type | |
volume | |
year | 2010 |
doi | |
issn | |
isbn | |
url | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5657256 |