On the detectability of hardware trojans embedded in parallel multipliers

Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki

研究成果: 書籍の章/レポート/Proceedings会議への寄与査読

抄録

This paper presents a new method for analyzing the detectability of a hardware Trojan (HT) that has infected parallel multipliers. The proposed method handles the Rare Path Trojan (RPT) that exploits the difficulty in activating a specific path of a parallel multiplier. In this paper we analyze some typical multipliers from the viewpoints of RPT characteristics and insertion/detection possibility. The validity of our criteria is evaluated by multiple regression analysis. Our experimental result indicates that a multiplier based on a redundant binary tree has a larger detectability than other ones.

本文言語英語
ホスト出版物のタイトルProceedings - 2018 IEEE 48th International Symposium on Multiple-Valued Logic, ISMVL 2018
出版社IEEE Computer Society
ページ62-67
ページ数6
ISBN(電子版)9781538644638
DOI
出版ステータス出版済み - 2018 7月 19
イベント48th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2018 - Linz, オーストリア
継続期間: 2018 5月 162018 5月 18

出版物シリーズ

名前Proceedings of The International Symposium on Multiple-Valued Logic
2018-May
ISSN(印刷版)0195-623X

会議

会議48th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2018
国/地域オーストリア
CityLinz
Period18/5/1618/5/18

フィンガープリント

「On the detectability of hardware trojans embedded in parallel multipliers」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル