TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits

There are increasing concerns about possible malicious modifications of integrated circuits (ICs) used in critical applications. Such attacks are often referred to as hardware Trojans. While many techniques focus on hardware Trojan detection during IC testing, it is still possible for attacks to go...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on computer-aided design of integrated circuits and systems Ročník 35; číslo 4; s. 521 - 534
Hlavní autori: Wu, Tony F., Ganesan, Karthik, Hu, Yunqing Alexander, Wong, H.-S. Philip, Wong, Simon, Mitra, Subhasish
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York IEEE 01.04.2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:0278-0070, 1937-4151
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract There are increasing concerns about possible malicious modifications of integrated circuits (ICs) used in critical applications. Such attacks are often referred to as hardware Trojans. While many techniques focus on hardware Trojan detection during IC testing, it is still possible for attacks to go undetected. Using a combination of new design techniques and new memory technologies, we present a new approach that detects a wide variety of hardware Trojans during IC testing and also during system operation in the field. Our approach can also prevent a wide variety of attacks during synthesis, place-and-route, and fabrication of ICs. It can be applied to any digital system, and can be tuned for both traditional and split-manufacturing methods. We demonstrate its applicability for both application-specified integrated circuits and field-programmable gate arrays. Using fabricated test chips with Trojan emulation capabilities and also using simulations, we demonstrate: 1) the area and power costs of our approach can range between 7.4%-165% and 7%-60%, respectively, depending on the design and the attacks targeted; 2) the speed impact can be minimal (close to 0%); 3) our approach can detect 99.998% of Trojans (emulated using test chips) that do not require detailed knowledge of the design being attacked; 4) our approach can prevent 99.98% of specific attacks (simulated) that utilize detailed knowledge of the design being attacked (e.g., through reverse engineering); and 5) our approach never produces any false positives, i.e., it does not report attacks when the IC operates correctly.
AbstractList There are increasing concerns about possible malicious modifications of integrated circuits (ICs) used in critical applications. Such attacks are often referred to as hardware Trojans. While many techniques focus on hardware Trojan detection during IC testing, it is still possible for attacks to go undetected. Using a combination of new design techniques and new memory technologies, we present a new approach that detects a wide variety of hardware Trojans during IC testing and also during system operation in the field. Our approach can also prevent a wide variety of attacks during synthesis, place-and-route, and fabrication of ICs. It can be applied to any digital system, and can be tuned for both traditional and split-manufacturing methods. We demonstrate its applicability for both application-specified integrated circuits and field-programmable gate arrays. Using fabricated test chips with Trojan emulation capabilities and also using simulations, we demonstrate: 1) the area and power costs of our approach can range between 7.4%-165% and 7%-60%, respectively, depending on the design and the attacks targeted; 2) the speed impact can be minimal (close to 0%); 3) our approach can detect 99.998% of Trojans (emulated using test chips) that do not require detailed knowledge of the design being attacked; 4) our approach can prevent 99.98% of specific attacks (simulated) that utilize detailed knowledge of the design being attacked (e.g., through reverse engineering); and 5) our approach never produces any false positives, i.e., it does not report attacks when the IC operates correctly.
Author Wong, Simon
Hu, Yunqing Alexander
Wu, Tony F.
Mitra, Subhasish
Wong, H.-S. Philip
Ganesan, Karthik
Author_xml – sequence: 1
  givenname: Tony F.
  surname: Wu
  fullname: Wu, Tony F.
  email: tonyfwu@stanford.edu
  organization: Department of Electrical Engineering, Stanford University, Stanford, CA, USA
– sequence: 2
  givenname: Karthik
  surname: Ganesan
  fullname: Ganesan, Karthik
  organization: Department of Electrical Engineering, Stanford University, Stanford, CA, USA
– sequence: 3
  givenname: Yunqing Alexander
  surname: Hu
  fullname: Hu, Yunqing Alexander
  organization: Department of Electrical Engineering, Stanford University, Stanford, CA, USA
– sequence: 4
  givenname: H.-S. Philip
  surname: Wong
  fullname: Wong, H.-S. Philip
  organization: Department of Electrical Engineering, Stanford University, Stanford, CA, USA
– sequence: 5
  givenname: Simon
  surname: Wong
  fullname: Wong, Simon
  organization: Department of Electrical Engineering, Stanford University, Stanford, CA, USA
– sequence: 6
  givenname: Subhasish
  surname: Mitra
  fullname: Mitra, Subhasish
  organization: Department of Electrical Engineering, Stanford University, Stanford, CA, USA
BookMark eNp9kE9Lw0AQxRepYFv9AOIl4Dl1Z_9ks95Kq7ZQtId4XjbZiaTUpG42it_exIoHD55mBt5vHu9NyKhuaiTkEugMgOqbbDFfzhgFOWNCCa74CRmD5ioWIGFExpSpNKZU0TMyadsdpSAk02PymG3ny9toZb37sB6jzDc7W0dbj-9Yh6qpI1u7aIkBi--rbHyv6dqALlrXAV-8HdZF5YuuCu05OS3tvsWLnzklz_d32WIVb54e1ov5Ji641CHWArjlZSKBYSHykkpBHUgJTmNuE6dpnkrhGOZARZm4PFdUcKfLsg-HWvApuT7-PfjmrcM2mF3T-bq3NKDSRGsJkvcqOKoK37Stx9IcfPVq_acBaobazFCbGWozP7X1jPrDFFWwQ_bgbbX_l7w6khUi_jopxjRLOf8CDNB7Yg
CODEN ITCSDI
CitedBy_id crossref_primary_10_1109_LES_2020_3000008
crossref_primary_10_3390_electronics14091902
crossref_primary_10_1049_2024_2023349
crossref_primary_10_1109_MDAT_2020_3033255
crossref_primary_10_3390_s25010079
crossref_primary_10_1109_TCAD_2020_2977069
crossref_primary_10_1049_iet_cdt_2018_5120
crossref_primary_10_1007_s41635_017_0020_3
crossref_primary_10_1109_TCAD_2024_3384948
crossref_primary_10_1007_s10836_019_05816_w
crossref_primary_10_1007_s41635_018_0040_7
crossref_primary_10_1109_TCAD_2017_2729340
crossref_primary_10_1145_3489409
crossref_primary_10_3390_electronics6020048
crossref_primary_10_1109_TETC_2021_3102832
crossref_primary_10_1109_TIFS_2019_2946044
crossref_primary_10_1145_3436820
crossref_primary_10_1109_ACCESS_2024_3383834
crossref_primary_10_1109_ACCESS_2018_2887268
crossref_primary_10_1049_iet_cdt_2020_0041
crossref_primary_10_1016_j_microrel_2021_114212
crossref_primary_10_1109_ACCESS_2020_2965016
crossref_primary_10_1109_TVLSI_2017_2727985
crossref_primary_10_1109_TVLSI_2019_2933441
crossref_primary_10_1007_s10836_019_05783_2
crossref_primary_10_1109_TCSI_2024_3364160
crossref_primary_10_1016_j_scico_2018_11_001
crossref_primary_10_1109_ACCESS_2025_3555166
crossref_primary_10_1109_TVLSI_2019_2908964
crossref_primary_10_3390_cryptography7010004
crossref_primary_10_1109_TC_2024_3449082
crossref_primary_10_1109_TCAD_2015_2474373
crossref_primary_10_1109_TEMC_2020_3003728
crossref_primary_10_1109_TIFS_2018_2850319
crossref_primary_10_1016_j_vlsi_2019_02_006
crossref_primary_10_3390_cryptography6030043
crossref_primary_10_1109_ACCESS_2018_2846583
crossref_primary_10_1109_TDSC_2017_2654352
Cites_doi 10.7873/DATE.2013.263
10.1109/TCAD.2014.2356453
10.1109/DFT.2014.6962084
10.1109/TC.2014.2360535
10.1109/43.644041
10.1109/SP.2010.19
10.1109/MDT.2012.2210183
10.1145/1558607.1558671
10.1007/978-3-642-04138-9_26
10.1109/DAC.2014.6881482
10.1145/2593069.2596681
10.1145/2463209.2488808
10.1109/TIFS.2010.2096811
10.1109/HASE.2008.37
10.1109/TIFS.2011.2181500
10.1109/12.4606
10.1109/IEDM.2011.6131506
10.1145/1629911.1630091
10.1109/TVLSI.2011.2147341
10.1145/357353.357357
10.1109/SP.2011.27
10.1109/FPGA.2000.903412
10.1109/ISSCC.2012.6177067
10.1109/ISIT.1994.394764
10.1109/HST.2014.6855561
10.1109/TC.1985.1676518
10.1145/2593069.2593123
10.1145/2508859.2516654
10.1109/TCAD.2006.887920
10.1109/AHS.2010.5546257
10.1109/HST.2013.6581575
10.1109/MSPEC.2015.7024511
10.1109/HST.2011.5954999
10.1109/TCAD.2015.2474373
10.1145/2591513.2591520
10.1109/HST.2013.6581564
10.1109/TCAD.2014.2354293
10.1109/VLSI.Design.2009.22
10.1109/MDT.2010.24
10.1109/TCAD.2012.2227257
10.1109/MC.2010.284
10.1109/TIT.2004.831844
10.1007/978-3-642-04138-9_27
10.1145/1629911.1630090
10.1109/TCOM.1982.1095473
10.1007/s10836-011-5255-2
10.1109/TCAD.2009.2028166
10.1109/TIFS.2011.2136339
10.1109/TVLSI.2010.2093547
10.1109/TED.2011.2157928
10.1109/ETS.2013.6569368
10.1109/HST.2011.5955007
10.1109/HST.2009.5224960
10.1090/S0025-5718-1965-0178586-1
10.1145/2228360.2228378
10.1109/MC.2010.299
10.1109/DFT.2014.6962098
10.1145/1950413.1950419
10.1109/TIT.1977.1055714
10.1145/1502781.1508209
10.1007/s13389-013-0068-0
10.1109/MDT.2010.7
10.1109/HST.2014.6855559
10.1109/HST.2011.5954989
10.1137/1.9781611972795.83
10.1145/2429384.2429508
10.1109/SP.2011.32
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCAD.2015.2474373
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library (IEL) (UW System Shared)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1937-4151
EndPage 534
ExternalDocumentID 4045933181
10_1109_TCAD_2015_2474373
7229283
Genre orig-research
GrantInformation_xml – fundername: IARPA Trusted Integrated Chips Program
GroupedDBID --Z
-~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IBMZZ
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PZZ
RIA
RIE
RNS
TN5
VH1
VJK
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c359t-9413a3f6512ec4bf0540d1551d9eba6d90b854d2eb104f6dbb7043d9ff474e943
IEDL.DBID RIE
ISICitedReferencesCount 70
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000372995000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0278-0070
IngestDate Sun Nov 30 05:00:31 EST 2025
Sat Nov 29 01:40:39 EST 2025
Tue Nov 18 22:20:18 EST 2025
Wed Aug 27 02:29:00 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords hardware security
concurrent error detection
randomized codes
resistive RAM (RRAM)
hardware Trojan
reliable computing
split manufacturing
3-D integration
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c359t-9413a3f6512ec4bf0540d1551d9eba6d90b854d2eb104f6dbb7043d9ff474e943
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1786995153
PQPubID 85470
PageCount 14
ParticipantIDs ieee_primary_7229283
crossref_primary_10_1109_TCAD_2015_2474373
proquest_journals_1786995153
crossref_citationtrail_10_1109_TCAD_2015_2474373
PublicationCentury 2000
PublicationDate 2016-April
2016-4-00
20160401
PublicationDateYYYYMMDD 2016-04-01
PublicationDate_xml – month: 04
  year: 2016
  text: 2016-April
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on computer-aided design of integrated circuits and systems
PublicationTitleAbbrev TCAD
PublicationYear 2016
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References jin (ref71) 2012
ref57
ref13
ref56
ref12
ref59
trimberger (ref58) 2007
ref14
ref53
saxena (ref25) 2004
ref52
ref55
ref54
ref10
roy (ref6) 2008
ref16
ref19
cakir (ref87) 2015
ref18
yu (ref43) 2011
wang (ref11) 2008
(ref36) 2011
imeson (ref90) 2013
ref51
ref50
(ref86) 2014
ref89
ref48
ref47
pradhan (ref17) 1996
ref42
ref85
ref41
ref88
ref44
ref49
ref8
ref7
ref9
ref4
ref3
ref5
ref82
ref81
ref40
ref84
ref83
bajura (ref46) 2011
ref80
ref79
ref78
ref37
king (ref1) 2008
ref75
ref31
ref74
ref30
ref77
ref33
ref76
ref32
ref2
ref39
ref38
ref70
ref73
cheung (ref34) 1989
ref68
ref24
ref67
ref26
ref69
lin (ref22) 2004
takeshi (ref45) 2014
ref64
wang (ref23) 2006
ref63
ref66
ref65
ref21
li (ref62) 2012
(ref15) 2011
ref28
(ref35) 2012
ref27
ref29
(ref20) 2014
li (ref60) 2008
ref61
jin (ref72) 2014
References_xml – ident: ref78
  doi: 10.7873/DATE.2013.263
– ident: ref66
  doi: 10.1109/TCAD.2014.2356453
– ident: ref14
  doi: 10.1109/DFT.2014.6962084
– ident: ref61
  doi: 10.1109/TC.2014.2360535
– ident: ref30
  doi: 10.1109/43.644041
– start-page: 965
  year: 2012
  ident: ref71
  article-title: Post-deployment trust evaluation in wireless cryptographic ICs
  publication-title: Proc DATE
– ident: ref54
  doi: 10.1109/SP.2010.19
– ident: ref68
  doi: 10.1109/MDT.2012.2210183
– ident: ref56
  doi: 10.1145/1558607.1558671
– ident: ref8
  doi: 10.1007/978-3-642-04138-9_26
– year: 2004
  ident: ref22
  publication-title: Error Control Coding
– ident: ref79
  doi: 10.1109/DAC.2014.6881482
– start-page: 1
  year: 2014
  ident: ref72
  article-title: Real-time trust evaluation in integrated circuits
  publication-title: Proc DATE
– ident: ref53
  doi: 10.1145/2593069.2596681
– start-page: 1
  year: 2008
  ident: ref1
  article-title: Designing and implementing malicious hardware
  publication-title: Proc lEE
– ident: ref13
  doi: 10.1145/2463209.2488808
– start-page: 15
  year: 2008
  ident: ref11
  article-title: Detecting malicious inclusions in secure hardware: Challenges and solutions
  publication-title: Proc HOST
– year: 2014
  ident: ref20
  publication-title: The Industry's First Floating-Point FPGA
– ident: ref76
  doi: 10.1109/TIFS.2010.2096811
– ident: ref81
  doi: 10.1109/HASE.2008.37
– ident: ref75
  doi: 10.1109/TIFS.2011.2181500
– ident: ref32
  doi: 10.1109/12.4606
– ident: ref16
  doi: 10.1109/IEDM.2011.6131506
– ident: ref73
  doi: 10.1145/1629911.1630091
– ident: ref74
  doi: 10.1109/TVLSI.2011.2147341
– year: 1989
  ident: ref34
  article-title: The weight distribution and randomness of linear codes
– year: 2014
  ident: ref86
  publication-title: Number of Primitive Polynomials of Degree N Over GF(2)
– ident: ref24
  doi: 10.1145/357353.357357
– ident: ref49
  doi: 10.1109/SP.2011.27
– start-page: 471
  year: 2015
  ident: ref87
  article-title: Hardware Trojan detection for gate-level ICs using signal correlation based clustering
  publication-title: Proc DATE
– ident: ref21
  doi: 10.1109/FPGA.2000.903412
– ident: ref28
  doi: 10.1109/ISSCC.2012.6177067
– ident: ref88
  doi: 10.1109/ISIT.1994.394764
– ident: ref40
  doi: 10.1109/HST.2014.6855561
– ident: ref26
  doi: 10.1109/TC.1985.1676518
– year: 1996
  ident: ref17
  publication-title: Fault-Tolerant Computer System Design
– ident: ref41
  doi: 10.1145/2593069.2593123
– ident: ref52
  doi: 10.1145/2508859.2516654
– ident: ref19
  doi: 10.1109/TCAD.2006.887920
– ident: ref4
  doi: 10.1109/AHS.2010.5546257
– ident: ref64
  doi: 10.1109/HST.2013.6581575
– start-page: 1331
  year: 2012
  ident: ref62
  article-title: A sensor-assisted self-authentication framework for hardware Trojan detection
  publication-title: Proc DATE
– year: 2012
  ident: ref35
  publication-title: OR1200 OpenRISC Processor
– ident: ref85
  doi: 10.1109/MSPEC.2015.7024511
– ident: ref67
  doi: 10.1109/HST.2011.5954999
– ident: ref89
  doi: 10.1109/TCAD.2015.2474373
– ident: ref59
  doi: 10.1145/2591513.2591520
– ident: ref65
  doi: 10.1109/HST.2013.6581564
– ident: ref77
  doi: 10.1109/TCAD.2014.2354293
– ident: ref69
  doi: 10.1109/VLSI.Design.2009.22
– ident: ref48
  doi: 10.1109/MDT.2010.24
– ident: ref42
  doi: 10.1109/TCAD.2012.2227257
– ident: ref47
  doi: 10.1109/MC.2010.284
– start-page: 495
  year: 2013
  ident: ref90
  article-title: Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation
  publication-title: Proc Usenix Security
– ident: ref31
  doi: 10.1109/TIT.2004.831844
– ident: ref10
  doi: 10.1007/978-3-642-04138-9_27
– start-page: 112
  year: 2014
  ident: ref45
  article-title: Reversing stealthy dopant-level circuits
  publication-title: Cryptographic Hardware and Embedded Systems
– ident: ref82
  doi: 10.1145/1629911.1630090
– ident: ref33
  doi: 10.1109/TCOM.1982.1095473
– ident: ref51
  doi: 10.1007/s10836-011-5255-2
– ident: ref50
  doi: 10.1109/TCAD.2009.2028166
– ident: ref80
  doi: 10.1109/TIFS.2011.2136339
– start-page: 138
  year: 2011
  ident: ref43
  article-title: TSV process optimization for reduced device impact on 28nm CMOS
  publication-title: Proc IEEE Symp VLSI Technol
– start-page: 65
  year: 2008
  ident: ref6
  article-title: Circuit CAD tools as a security threat
  publication-title: Proc HOST
– start-page: 1
  year: 2011
  ident: ref46
  article-title: Imaging integrated circuits with X-ray microscopy
  publication-title: Proc 36th GOMACTech Conf
– ident: ref70
  doi: 10.1109/TVLSI.2010.2093547
– ident: ref29
  doi: 10.1109/TED.2011.2157928
– ident: ref3
  doi: 10.1109/ETS.2013.6569368
– ident: ref44
  doi: 10.1109/HST.2011.5955007
– start-page: 5
  year: 2007
  ident: ref58
  article-title: Trusted design in FPGAs
  publication-title: Proc DAC
– year: 2004
  ident: ref25
  article-title: Primitive polynomial generation algorithms implementation and performance analysis
– ident: ref84
  doi: 10.1109/HST.2009.5224960
– ident: ref37
  doi: 10.1090/S0025-5718-1965-0178586-1
– ident: ref12
  doi: 10.1145/2228360.2228378
– ident: ref2
  doi: 10.1109/MC.2010.299
– ident: ref55
  doi: 10.1109/DFT.2014.6962098
– ident: ref18
  doi: 10.1145/1950413.1950419
– ident: ref38
  doi: 10.1109/TIT.1977.1055714
– year: 2011
  ident: ref36
  publication-title: Nangate 45nm open cell library
– ident: ref57
  doi: 10.1145/1502781.1508209
– ident: ref9
  doi: 10.1007/s13389-013-0068-0
– ident: ref5
  doi: 10.1109/MDT.2010.7
– year: 2011
  ident: ref15
  publication-title: TIC Program
– start-page: 519
  year: 2006
  ident: ref23
  publication-title: VLSI Test Principles and Architectures Design for Testability
– ident: ref39
  doi: 10.1109/HST.2014.6855559
– ident: ref83
  doi: 10.1109/HST.2011.5954989
– start-page: 8
  year: 2008
  ident: ref60
  article-title: At-speed delay characterization for IC authentication and Trojan horse detection
  publication-title: Proc HOST
– ident: ref27
  doi: 10.1137/1.9781611972795.83
– ident: ref63
  doi: 10.1145/2429384.2429508
– ident: ref7
  doi: 10.1109/SP.2011.32
SSID ssj0014529
Score 2.47501
Snippet There are increasing concerns about possible malicious modifications of integrated circuits (ICs) used in critical applications. Such attacks are often...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 521
SubjectTerms 3D Integration
Concurrent Error Detection
Electronics industry
Encoding
Hardware
Hardware Security
Hardware Trojan
Integrated circuits
Monitoring
Random access memory
Randomized Codes
Reliable Computing
Resistive RAM
Split-manufacturing
Trojan horses
Wires
Title TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits
URI https://ieeexplore.ieee.org/document/7229283
https://www.proquest.com/docview/1786995153
Volume 35
WOSCitedRecordID wos000372995000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library (IEL) (UW System Shared)
  customDbUrl:
  eissn: 1937-4151
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014529
  issn: 0278-0070
  databaseCode: RIE
  dateStart: 19820101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB7a4kEPvqpYrbIHT2LaPDa7WW_FWvRSeojQW9hkJ1CRVNJU_76726QoiuAtkNmQzOzOTObxDcC1iAST2i9wKPelQzGUToqRZzqWPa71YaYktcMm-HQazedi1oLbbS8MItriMxyYS5vLV8tsbUJlQ-77QpvDNrQ5Z5terW3GwCQQbTzFIMbqfVxnMD1XDGP9UaaIKxz4lBson282yA5V-aGJrXmZHPzvxQ5hv3YjyWgj9yNoYXEMe1_ABbswjWej8R0xqfkPWSKJy-WLLEiD2bQsiCwUGWNli7EKor1XTbM24U_y1IBIKHK_KLP1olqdwPPkIb5_dOrpCU4WhKJyhDZPMsiZtuiY0TQ3vpkyDpISmEqmhJtGIVW-VtYuzZlKU-7SQIk810xCQYNT6BTLAs-A5G4u9B0MMMupZmmKnsEU8AKWegwF64Hb8DPJamhxM-HiNbG_GK5IjAgSI4KkFkEPbrZL3ja4Gn8Rdw3Pt4Q1u3vQb4SW1CdvlXg8YkK7jWFw_vuqC9jVz2ab6ps-dKpyjZewk71Xi1V5ZTfVJymJx-c
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB58gXrwLdbnHjyJ0Tw2m6y34gOLtfQQwVvYZCdQkVTSVP--O9u0KIrgLZBZkszszkzm8Q3AqYylUMYvcHjkK4djqJwMY486lr3I6MNcK26HTUS9Xvz8LPtzcD7rhUFEW3yGF3Rpc_l6mI8pVHYZ-b405nAeFmlyVtOtNcsZUArRRlQIM9bs5CaH6bnyMjGfRWVc4YXPIwLz-WaF7FiVH7rYGpi79f-92gasNY4ka08kvwlzWG7B6hd4wW3oJf32zRWj5PyHqpAl1fBFlWyK2jQsmSo1u8HalmOVzPivhmZMAVDWmcJIaHY9qPLxoB7twNPdbXJ97zTzE5w8CGXtSMMjFRTC2HTMeVaQd6bJRdISMyW0dLM45No36trlhdBZFrk80LIoDJNQ8mAXFsphiXvACreQ5g4GmBfcsDRDj1AFvEBknkApWuBO-ZnmDbg4zbh4Te1PhitTEkFKIkgbEbTgbLbkbYKs8RfxNvF8RtiwuwWHU6GlzdkbpV4UC2kcxzDY_33VCSzfJ4_dtNvpPRzAinmOmNTiHMJCXY3xCJby93owqo7tBvsEv9HLMA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=TPAD%3A+Hardware+Trojan+Prevention+and+Detection+for+Trusted+Integrated+Circuits&rft.jtitle=IEEE+transactions+on+computer-aided+design+of+integrated+circuits+and+systems&rft.au=Wu%2C+Tony+F.&rft.au=Ganesan%2C+Karthik&rft.au=Hu%2C+Yunqing+Alexander&rft.au=Wong%2C+H.-S.+Philip&rft.date=2016-04-01&rft.issn=0278-0070&rft.eissn=1937-4151&rft.volume=35&rft.issue=4&rft.spage=521&rft.epage=534&rft_id=info:doi/10.1109%2FTCAD.2015.2474373&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCAD_2015_2474373
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0278-0070&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0278-0070&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0278-0070&client=summon