@inproceedings{46a1ebefe0cc4a7093aa548b4fa87a7a,
title = "On the detectability of hardware trojans embedded in parallel multipliers",
abstract = "This paper presents a new method for analyzing the detectability of a hardware Trojan (HT) that has infected parallel multipliers. The proposed method handles the Rare Path Trojan (RPT) that exploits the difficulty in activating a specific path of a parallel multiplier. In this paper we analyze some typical multipliers from the viewpoints of RPT characteristics and insertion/detection possibility. The validity of our criteria is evaluated by multiple regression analysis. Our experimental result indicates that a multiplier based on a redundant binary tree has a larger detectability than other ones.",
keywords = "Arithmetic Algorithms, Hardware Trojans, Multipliers, Path Delay Faults",
author = "Akira Ito and Rei Ueno and Naofumi Homma and Takafumi Aoki",
note = "Funding Information: ACKNOWLEDGMENT This research has been supported by JSPS KAKENHI Grants No. 17H00729, No. 16K12436 and No. 16J05711. Publisher Copyright: {\textcopyright} 2018 IEEE.; 48th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2018 ; Conference date: 16-05-2018 Through 18-05-2018",
year = "2018",
month = jul,
day = "19",
doi = "10.1109/ISMVL.2018.00019",
language = "English",
series = "Proceedings of The International Symposium on Multiple-Valued Logic",
publisher = "IEEE Computer Society",
pages = "62--67",
booktitle = "Proceedings - 2018 IEEE 48th International Symposium on Multiple-Valued Logic, ISMVL 2018",
address = "United States",
}