1. A Survey on Recent Detection Methods of the Hardware Trojans
- Author
-
A. Napolean, V Janani, N. M. Sivamangai, and R. NaveenKumar
- Subjects
010302 applied physics ,Hardware security module ,Computer science ,business.industry ,Reliability (computer networking) ,media_common.quotation_subject ,02 engineering and technology ,Integrated circuit design ,Integrated circuit ,01 natural sciences ,020202 computer hardware & architecture ,law.invention ,Hardware Trojan ,law ,0103 physical sciences ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,business ,Function (engineering) ,Formal verification ,Computer hardware ,Electronic circuit ,media_common - Abstract
Modern integrated circuit design contains various constraints from the frontend to the backend. In microelectronic systems hardware security is a major threat. Hardware Trojan (HT) plays a vital role in hardware security issues. The HT leads to a malicious modification of the integrated circuit (IC). The HT detection aims to assure the trustworthiness of the circuits and improve the reliability of the system. In this article, we presented a review of the various hardware detection techniques like pre-deployment, post-deployment, formal verification, counterfeiting prevention and IC production, physically-unclonable function HT detection techniques. Moreover, HT parameters are analyzed for specific benchmarks.
- Published
- 2021