

Design and Implementation of logic circuit to detect and counter Hardware Trojan
Abstract
This paper presents a study on the integrated circuit (IC) ecosystem, focusing on the escalating threat posed by hardware trojan horses. As hardware designs grow in complexity, the risk of malicious insertions, particularly on printed circuit boards (PCBs), is increasing. Of notable concern is the emergence of hardware-based ransomware attacks. This paper presents a ring oscillator-based technique to improve the wire and the net coverage examines various methods for detecting hardware trojans and proposes measures for safeguarding sensitive data through encryption, offering essential protection against malicious activities and potential data breaches.
References
. H.E. Taheri, M. Mirhassani, A pre-activation, golden IC free, hardware Trojan detection approach. IEEE Trans. (2023)
Large Scale Integr. Syst. 30(3), 315–324 (2023)
M. Elshamy, G.D. Natale, A. Sayed, A. Pavlidis, M.-M. Louërat et al., Digital-to-analog hardware Trojan attacks. IEEE
Trans. Circuits Syst. I Regul. Pap. 69(2), 573586 (2022)
D. S, R. S. R and N. D. M, Hardware Trojan detection using ring oscillator, in International Conference on Communication and Electronics Systems (ICCES), pp. 362–368 (2021)
S. Alhelaly, J. Dworak, K. Nepal, T. Manikas, P. Gui et al., 3D ring oscillator based test structures to detect a Trojan Die
in a 3D die stack in the presence of process variations. IEEE Trans. Emerg. Top. Comput. 9(2), 774–786 (2021)
Refbacks
- There are currently no refbacks.