Article ID Journal Published Year Pages File Type
10127130 Microprocessors and Microsystems 2018 11 Pages PDF
Abstract
Using the proposed method, the payload part of Trojans will be detected according to their size and cell types. Our method can be used by power-based Trojan detection approaches for finding the trigger part of Trojans. We also introduce an algorithm for quantifying the vulnerability of the nets. We show that a designer can achieve a good trade-off between area overhead reduction and security enhancement while evaluating the vulnerability degree of each net.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,