Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10127130 | Microprocessors and Microsystems | 2018 | 11 Pages |
Abstract
Using the proposed method, the payload part of Trojans will be detected according to their size and cell types. Our method can be used by power-based Trojan detection approaches for finding the trigger part of Trojans. We also introduce an algorithm for quantifying the vulnerability of the nets. We show that a designer can achieve a good trade-off between area overhead reduction and security enhancement while evaluating the vulnerability degree of each net.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Mohammad Reza Asadi Kouhanjani, Amir Hossein Jahangir,