3 Online Checkers to Detect Hardware Trojans in AES Hardware Accelerators

Sree Ranjani Rajendran1 and Rajat Subhra Chakraborty2

1RISE Lab, Indian Institute of Technology Madras, Chennai, Tamil Nadu, India

2Indian Institute of Technology Kharagpur, Kharagpur, West Bengal, India

  1. CONTENTS
  2. 3.1 Introduction: Background and Driving Forces
  3. 3.1.1 Threat Model
  4. 3.2 Proposed Methodology: Online Monitoring for HT Detection
  5. 3.2.1 Reliability-Based Node Selection to Insert Checker
  6. 3.3 Results and Discussion
  7. 3.3.1 Results of Benchmark Circuits
  8. 3.3.2 Results for AES Encryption Unit
  9. 3.4 Conclusion
  10. References

DOI: 10.1201/9781003201038-3

3.1 Introduction: Background and Driving Forces

ICs embedded in crypto-devices should be trustworthy in nature. However, ...

Get VLSI and Hardware Implementations using Modern Machine Learning Methods now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.