Zhang et al., 2011 - Google Patents
RON: An on-chip ring oscillator network for hardware Trojan detectionZhang et al., 2011
View PDF- Document ID
- 13325218478758006028
- Author
- Zhang X
- Tehranipoor M
- Publication year
- Publication venue
- 2011 Design, Automation & Test in Europe
External Links
Snippet
Integrated circuits (ICs) are becoming increasingly vulnerable to malicious alterations, referred to as hardware Trojans. Detection of these inclusions is of utmost importance, as they may potentially be inserted into ICs bound for military, financial, or other critical …
- 238000001514 detection method 0 title abstract description 25
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3183—Generation of test inputs, e.g. test vectors, patterns or sequence
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/31718—Logistic aspects, e.g. binning, selection, sorting of devices under test, tester/handler interaction networks, Test management software, e.g. software for test statistics or test evaluation, yield analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/30—Marginal testing, e.g. varying supply voltage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | RON: An on-chip ring oscillator network for hardware Trojan detection | |
Narasimhan et al. | Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach | |
Cruz et al. | An automated configurable Trojan insertion framework for dynamic trust benchmarks | |
Salmani et al. | On design vulnerability analysis and trust benchmarks development | |
Narasimhan et al. | TeSR: A robust temporal self-referencing approach for hardware Trojan detection | |
Wolff et al. | Towards Trojan-free trusted ICs: Problem analysis and detection scheme | |
Zick et al. | Sensing nanosecond-scale voltage attacks and natural transients in FPGAs | |
Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
Zhang et al. | Path-delay fingerprinting for identification of recovered ICs | |
Kelly et al. | Detecting hardware trojans using on-chip sensors in an asic design | |
Ferraiuolo et al. | Experimental analysis of a ring oscillator network for hardware trojan detection in a 90nm asic | |
Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
WO2012122309A2 (en) | Embedded ring oscillator network for integrated circuit security and threat detection | |
Zhang et al. | Detection of trojans using a combined ring oscillator network and off-chip transient power analysis | |
Jin et al. | Real-time trust evaluation in integrated circuits | |
Wang et al. | Malicious circuitry detection using transient power analysis for IC security | |
Zhang et al. | A study on the effectiveness of Trojan detection techniques using a red team blue team approach | |
Farheen et al. | A twofold clock and voltage-based detection method for laser logic state imaging attack | |
Yang et al. | Golden-free hardware trojan detection using self-referencing | |
Fournaris et al. | An fpga hardware trojan detection approach based on multiple parameter analysis | |
Shekarian et al. | Neutralizing a design-for-hardware-trust technique | |
Wang et al. | Test generation for combinational hardware Trojans | |
Hoque et al. | Assessment of NAND based ring oscillator for hardware Trojan detection | |
Mingfu et al. | Monte Carlo based test pattern generation for hardware Trojan detection | |
Yang et al. | Side-channel analysis for hardware Trojan detection using machine learning |