On the detectability of hardware trojans embedded in parallel multipliers

研究成果: Conference contribution

抄録

This paper presents a new method for analyzing the detectability of a hardware Trojan (HT) that has infected parallel multipliers. The proposed method handles the Rare Path Trojan (RPT) that exploits the difficulty in activating a specific path of a parallel multiplier. In this paper we analyze some typical multipliers from the viewpoints of RPT characteristics and insertion/detection possibility. The validity of our criteria is evaluated by multiple regression analysis. Our experimental result indicates that a multiplier based on a redundant binary tree has a larger detectability than other ones.

本文言語English
ホスト出版物のタイトルProceedings - 2018 IEEE 48th International Symposium on Multiple-Valued Logic, ISMVL 2018
出版社IEEE Computer Society
ページ62-67
ページ数6
ISBN(電子版)9781538644638
DOI
出版ステータスPublished - 2018 7 19
イベント48th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2018 - Linz, Austria
継続期間: 2018 5 162018 5 18

出版物シリーズ

名前Proceedings of The International Symposium on Multiple-Valued Logic
2018-May
ISSN(印刷版)0195-623X

Other

Other48th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2018
国/地域Austria
CityLinz
Period18/5/1618/5/18

ASJC Scopus subject areas

  • コンピュータ サイエンス(全般)
  • 数学 (全般)

フィンガープリント

「On the detectability of hardware trojans embedded in parallel multipliers」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル