{"title":"硬件木马检测使用改进的可测试性措施","authors":"P. Naskar, Tapobrata Dhar, S. Roy","doi":"10.1109/ISDCS49393.2020.9263026","DOIUrl":null,"url":null,"abstract":"The globalised nature of design and manufacturing process of Integrated Circuits (ICs) makes them susceptible to malicious alterations called Hardware Trojan Horses (HTH). Prior estimation of degree of vulnerability of internal nets of an IC is therefore a valuable measure to ensure its security. An improved testability measurement process has been suggested by this paper, which effectively assesses the vulnerability of the internal nets to HTH insertion. The evaluated vulnerability measures can be used to generate test patterns, which in turn helps detect the presence of HTH in the IC.","PeriodicalId":177307,"journal":{"name":"2020 International Symposium on Devices, Circuits and Systems (ISDCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Hardware Trojan Detection Using Improved Testability Measures\",\"authors\":\"P. Naskar, Tapobrata Dhar, S. Roy\",\"doi\":\"10.1109/ISDCS49393.2020.9263026\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The globalised nature of design and manufacturing process of Integrated Circuits (ICs) makes them susceptible to malicious alterations called Hardware Trojan Horses (HTH). Prior estimation of degree of vulnerability of internal nets of an IC is therefore a valuable measure to ensure its security. An improved testability measurement process has been suggested by this paper, which effectively assesses the vulnerability of the internal nets to HTH insertion. The evaluated vulnerability measures can be used to generate test patterns, which in turn helps detect the presence of HTH in the IC.\",\"PeriodicalId\":177307,\"journal\":{\"name\":\"2020 International Symposium on Devices, Circuits and Systems (ISDCS)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Symposium on Devices, Circuits and Systems (ISDCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDCS49393.2020.9263026\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Symposium on Devices, Circuits and Systems (ISDCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDCS49393.2020.9263026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hardware Trojan Detection Using Improved Testability Measures
The globalised nature of design and manufacturing process of Integrated Circuits (ICs) makes them susceptible to malicious alterations called Hardware Trojan Horses (HTH). Prior estimation of degree of vulnerability of internal nets of an IC is therefore a valuable measure to ensure its security. An improved testability measurement process has been suggested by this paper, which effectively assesses the vulnerability of the internal nets to HTH insertion. The evaluated vulnerability measures can be used to generate test patterns, which in turn helps detect the presence of HTH in the IC.