Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model
by
Anita, J. P.
, Mohan, Navya
in
Algorithms
/ Analysis
/ clustered Trojans
/ Computer crimes
/ Critical path
/ Delay
/ Fault detection
/ Fault location (Engineering)
/ Hardware
/ hardware Trojan detection
/ Integrated circuits
/ K-Means clustering
/ Logic
/ Malware
/ Methods
/ Pattern generation
/ Prevention
/ Reliability (Engineering)
/ reliability attack
/ Safety and security measures
/ SAT solvers
/ Semiconductor chips
/ Test pattern generators
/ Transistors
/ Transition Delay Faults
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model
by
Anita, J. P.
, Mohan, Navya
in
Algorithms
/ Analysis
/ clustered Trojans
/ Computer crimes
/ Critical path
/ Delay
/ Fault detection
/ Fault location (Engineering)
/ Hardware
/ hardware Trojan detection
/ Integrated circuits
/ K-Means clustering
/ Logic
/ Malware
/ Methods
/ Pattern generation
/ Prevention
/ Reliability (Engineering)
/ reliability attack
/ Safety and security measures
/ SAT solvers
/ Semiconductor chips
/ Test pattern generators
/ Transistors
/ Transition Delay Faults
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model
by
Anita, J. P.
, Mohan, Navya
in
Algorithms
/ Analysis
/ clustered Trojans
/ Computer crimes
/ Critical path
/ Delay
/ Fault detection
/ Fault location (Engineering)
/ Hardware
/ hardware Trojan detection
/ Integrated circuits
/ K-Means clustering
/ Logic
/ Malware
/ Methods
/ Pattern generation
/ Prevention
/ Reliability (Engineering)
/ reliability attack
/ Safety and security measures
/ SAT solvers
/ Semiconductor chips
/ Test pattern generators
/ Transistors
/ Transition Delay Faults
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model
Journal Article
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model
2023
Request Book From Autostore
and Choose the Collection Method
Overview
The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay in certain parts of the circuit. These delay faults easily escape during the integrated circuits (IC) testing phase, hence are difficult to detect. If additional patterns to detect delay faults are generated during the test pattern generation stage, then reliability attacks can be detected early without any hardware overhead. This paper proposes a novel method to generate patterns that trigger Trojans without altering the circuit model. The generated patterns’ ability to diagnose clustered Trojans are also analyzed. The proposed method uses only single fault simulation to detect clustered Trojans, thereby reducing the computational complexity. Experimental results show that the proposed algorithm has a detection ratio of 99.99% when applied on ISCAS’89, ITC’99 and IWLS’05 benchmark circuits. Experiments on clustered Trojans indicate a 46% and 34% improvement in accuracy and resolution compared to a standard Automatic Test Pattern Generator (ATPG)Tool.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.