Difference between revisions of "Wei2012provably"
From ACES
(Import from BibTeX) |
m (Import from BibTeX) |
||
Line 3: | Line 3: | ||
|url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6386729 | |url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6386729 | ||
|abstract=<p>This paper proposes a novel minimal test point insertion methodology that provisions a provably complete detection of hardware Trojans by noninvasive timing characterization. The objective of test point insertion is to break the reconvergent paths so that target routes for Trojan delay testing are specifically observed. We create a satisfiability-based input vector selection for sensitizing and characterizing each single timing path. Evaluations on benchmark circuits demonstrate that the test point-based Trojan detection can cover all circuit locations and can detect Trojans accurately with less than 5\% performance overhead.</p> | |abstract=<p>This paper proposes a novel minimal test point insertion methodology that provisions a provably complete detection of hardware Trojans by noninvasive timing characterization. The objective of test point insertion is to break the reconvergent paths so that target routes for Trojan delay testing are specifically observed. We create a satisfiability-based input vector selection for sensitizing and characterizing each single timing path. Evaluations on benchmark circuits demonstrate that the test point-based Trojan detection can cover all circuit locations and can detect Trojans accurately with less than 5\% performance overhead.</p> | ||
|month=11 | |||
|year=2012 | |||
|booktitle=IEEE/ACM International Conference on Computer-Aided Design (ICCAD) | |booktitle=IEEE/ACM International Conference on Computer-Aided Design (ICCAD) | ||
|title=Provably Complete Hardware Trojan Detection Using Test Point Insertion | |title=Provably Complete Hardware Trojan Detection Using Test Point Insertion | ||
|entry=inproceedings | |entry=inproceedings | ||
}} | }} |
Revision as of 03:39, 4 September 2021
Wei2012provably | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Sheng Wei and Kai Li and Farinaz Koushanfar and Potkonjak, Miodrag |
booktitle | IEEE/ACM International Conference on Computer-Aided Design (ICCAD) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 11 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | Provably Complete Hardware Trojan Detection Using Test Point Insertion |
type | |
volume | |
year | 2012 |
doi | |
issn | |
isbn | |
url | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6386729 |