Method, system and chip for detecting hardware Trojans in circuits
A hardware Trojan horse and circuit technology, applied in the field of integrated circuit trustworthiness detection, can solve the problems of reducing operability and practical applicability, destroying original circuit functions, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.
[0044] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.
[0045] Hardware Trojans are malicious circuits implanted in integrated circuits by attackers to achieve certain attack purposes. In order to avoid hardware Trojans being detected by traditional functional testing and structural testing techniques, attackers generally choose relatively concealed activation conditions to achieve Low concealment of hardware Trojans. When the hardware Trojan is in a silent state, the hardware ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


