Difference between revisions of "Koushanfar2010a"

From ACES

(Import from BibTeX)
 
m (Import from BibTeX)
Line 4: Line 4:
|keywords=Change detection algorithms, circuit Trojan detection, gate-level characterization, hardware malware detection, hardware security and trust, submodular functions, timing/power tests.
|keywords=Change detection algorithms, circuit Trojan detection, gate-level characterization, hardware malware detection, hardware security and trust, submodular functions, timing/power tests.
|abstract=<p>This paper presents a unified formal framework for integrated circuits (IC) Trojan detection that can simultaneously employ multiple noninvasive measurement types. Hardware Trojans refer to modifications, alterations, or insertions to the original IC for adversarial purposes. The new framework formally defines the IC Trojan detection for each measurement type as an optimization problem and discusses the complexity. A formulation of the problem that is applicable to a large class of Trojan detection problems and is submodular is devised. Based on the objective function properties, an efficient Trojan detection method with strong approximation and optimality guarantees is introduced. Signal processing methods for calibrating the impact of inter-chip and intra-chip correlations are presented. We propose a number of methods for combining the detections of the different measurement types. Experimental evaluations on benchmark designs reveal the low-overhead and effectiveness of the new Trojan detection framework and provides a comparison of different detection combining methods.</p>
|abstract=<p>This paper presents a unified formal framework for integrated circuits (IC) Trojan detection that can simultaneously employ multiple noninvasive measurement types. Hardware Trojans refer to modifications, alterations, or insertions to the original IC for adversarial purposes. The new framework formally defines the IC Trojan detection for each measurement type as an optimization problem and discusses the complexity. A formulation of the problem that is applicable to a large class of Trojan detection problems and is submodular is devised. Based on the objective function properties, an efficient Trojan detection method with strong approximation and optimality guarantees is introduced. Signal processing methods for calibrating the impact of inter-chip and intra-chip correlations are presented. We propose a number of methods for combining the detections of the different measurement types. Experimental evaluations on benchmark designs reveal the low-overhead and effectiveness of the new Trojan detection framework and provides a comparison of different detection combining methods.</p>
|month=5
|year=2010
|booktitle=Information Hiding Conference
|booktitle=Information Hiding Conference
|title=A unified framework for multimodal submodular IC trojan detection
|title=A unified framework for multimodal submodular IC trojan detection
|entry=inproceedings
|entry=inproceedings
|date=2010-Ma-01
}}
}}

Revision as of 03:38, 4 September 2021

Koushanfar2010a
entryinproceedings
address
annote
authorFarinaz Koushanfar and Azalia Mirhoseini and Y. Alkabani
booktitleInformation Hiding Conference
chapter
edition
editor
howpublished
institution
journal
month5
note
number
organization
pages
publisher
school
series
titleA unified framework for multimodal submodular IC trojan detection
type
volume
year2010
doi
issn
isbn
urlhttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5657256
pdf


Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093