Skip to main content
Detecting Hardware Trojans with Gate-Level Information-Flow Tracking
Published Web Location
http://kastner.ucsd.edu/wp-content/uploads/2013/08/admin/computer16-glift_trojans.pdfNo data is associated with this publication.
Abstract
A method based on information-flow tracking uses gate-level logic to detect hardware Trojans that violate the confidentiality and integrity properties of third-party IP cores. Experiments on trust-HUB benchmarks show that the method reveals Trojan behavior and unintentional design vulnerabilities that functional testing cannot pinpoint.
Many UC-authored scholarly publications are freely available on this site because of the UC's open access policies. Let us know how this access is important for you.