Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features
Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction and lower levels, and only a few studies have in...
Main Authors: | Aminanto, M.E (Author), Septafiansyah, D.P (Author), Sutikno, S. (Author), Wijitrisnanto, F. (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
Similar Items
-
A New Characterization of Hardware Trojans
by: Samer Moein, et al.
Published: (2016-01-01) -
Ensuring Trust Of Third-Party Hardware Design With Constrained Sequential Equivalence Checking
by: Shrestha, Gyanendra
Published: (2014) -
A Benchmark Suite of Hardware Trojans for On-Chip Networks
by: Jian Wang, et al.
Published: (2019-01-01) -
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
by: Simranjeet Sidhu, et al.
Published: (2019-08-01) -
Trojan Detection in Hardware Designs
by: Raju, Akhilesh
Published: (2017)