3 Online Checkers to Detect Hardware Trojans in AES Hardware Accelerators
1RISE Lab, Indian Institute of Technology Madras, Chennai, Tamil Nadu, India
2Indian Institute of Technology Kharagpur, Kharagpur, West Bengal, India
- CONTENTS
- 3.1 Introduction: Background and Driving Forces
- 3.1.1 Threat Model
- 3.2 Proposed Methodology: Online Monitoring for HT Detection
- 3.2.1 Reliability-Based Node Selection to Insert Checker
- 3.3 Results and Discussion
- 3.3.1 Results of Benchmark Circuits
- 3.3.2 Results for AES Encryption Unit
- 3.4 Conclusion
- References
3.1 Introduction: Background and Driving Forces
ICs embedded in crypto-devices should be trustworthy in nature. However, ...
Get VLSI and Hardware Implementations using Modern Machine Learning Methods now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.