Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/2339
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar K, S-
dc.contributor.authorChanamala, R-
dc.contributor.authorSahoo, S R-
dc.contributor.authorMahapatra, K K-
dc.date.accessioned2015-07-07T11:53:25Z-
dc.date.available2015-07-07T11:53:25Z-
dc.date.issued2015-06-
dc.identifier.citation19th International Symposium on VLSI Design and Test (VDAT-2015),Institute of Technology, Nirma University, Ahmedabad, India.26-29 June 2015.en_US
dc.identifier.urihttp://hdl.handle.net/2080/2339-
dc.descriptionCopyright belong to proceeding publisheren_US
dc.description.abstractThe semiconductor design industry has globalized and it is economical for the chip makers to get services from the different geographies in design, manufacturing and testing. Globalization raises the question of trust in an integrated circuit. It is for the every chip maker to ensure there is no malicious inclusion in the design, which is referred as Hardware Trojans. Malicious inclusion can occur by an in-house adversary design engineer, Intellectual Property (IP) core supplied from the third party vendor or at untrusted manufacturing foundry. Several researchers have proposed hardware Trojan detection schemes in the recent years. Trust-Hub provides Trojan benchmark circuits to verify the strength of the Trojan detection techniques. In this work, our focus is on Advanced Encryption Standard (AES) Trojan benchmarks, which is most vulnerable block cipher for Trojan attacks. All 21 Benchmarks available in Trusthub are analyzed against standard coverage driven verification practices, synthesis, DFT insertion and ATPG simulations. The analysis reveals that 19 AES benchmarks are weak and Trojan inclusion can be detected using standard procedures used in ASIC design flow. Based on the weakness observed design modification is proposed to improve the quality of Trojan benchmarks. The strength of proposed Trojan benchmarks is better than existing circuits and their original features are also preserved after design modificationen_US
dc.language.isoenen_US
dc.subjectHardware Trojanen_US
dc.subjectAESen_US
dc.subjectTrust-Huben_US
dc.subjectSecurityen_US
dc.subjectASICen_US
dc.titleAn Improved AES Hardware Trojan Benchmark to Validate Trojan Detection Schemes in an ASIC Design Flowen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
vdat-2015-trojan_camera.pdf465.26 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.