Detecting malicious modifications of data in third-party intellectual property cores

Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue elements in the intellectual property (IP) vendor companies to insert malicious circuits (a.k.a. hardware Trojans) into their IPs. We propose to formally verify third party IPs (3PIPs) for unauthorized corrupti...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings - ACM IEEE Design Automation Conference pp. 1 - 6
Main Authors: Rajendran, Jeyavijayan, Vedula, Vivekananda, Karri, Ramesh
Format: Conference Proceeding
Language:English
Published: IEEE 07.06.2015
Subjects:
ISSN:0738-100X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first