On the limitations of logic testing for detecting Hardware Trojans Horses
Abstract
The insertion of malicious alterations to a circuit, referred to as Hardware Trojan Horses (HTH), is a threat considered more and more seriously in the last years. Several methods have been proposed in literature to detect the presence of such alterations. Among them, logic testing approaches consist in trying to activate potential HTHs and detect erroneous outputs by exploiting manufacturing digital test techniques. Besides the complexity of this approach due to the intrinsic stealthiness of the potential HTH, we will show that a particular HTH targeting the test infrastructure itself may jeopardize the possibility of detecting any other alterations.
Fichier principal
OnTheLimitationsofLogicTestingforDetectingHTH.pdf (563.56 Ko)
Télécharger le fichier
Origin | Files produced by the author(s) |
---|
Loading...