A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits

Modern IC designs often involve outsourced IP cores. It is convinced that there are opportunities in which the IP cores contain malicious logic, namely hardware Trojan (HT), which raises serious concerns about the trustworthiness of ICs used in mission-critical applications. This paper proposes an H...

Full description

Bibliographic Details
Main Authors: Qiang Liu, Pengyong Zhao, Fuqiang Chen
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8675936/