Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tseng, Tien-Hung | en_US |
dc.contributor.author | Li, Shou-Chun | en_US |
dc.contributor.author | Wu, Kai-Chiang | en_US |
dc.date.accessioned | 2019-04-02T06:04:32Z | - |
dc.date.available | 2019-04-02T06:04:32Z | - |
dc.date.issued | 2018-01-01 | en_US |
dc.identifier.issn | 1081-7735 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/ATS.2018.00025 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/151041 | - |
dc.description.abstract | Due to escalating complexity of hardware design and manufacturing, integrated circuits (ICs) are designed and fabricated in multiple nations, so are software tools. It makes hardware security become more subject to various kinds of tampering in the supply chain. Hardware Trojan horses (HTHs) can be implanted to facilitate the leakage of confidential information or cause the failure of a system. Reliability Trojan is one of the main categories of HTH attacks because its behavior is progressive and thus hard to be detected, or not considered malicious. In this work, we propose to insert reliability Trojan into a circuit which can finely control the circuit lifetime as specified by attackers (or even designers), based on manipulating BTI-induced aging behavior in a statistical manner, with the consideration of process variations (PVs). Experimental results show that, given a specified lifetime target and under the influence of PVs, the circuit is highly likely to fail within a desired lifetime interval, at the cost of little area overhead. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | lifetime Trojan | en_US |
dc.subject | duty cycle | en_US |
dc.subject | aging | en_US |
dc.subject | timing violation | en_US |
dc.title | Lifetime Reliability Trojan based on Exploring Malicious Aging | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.doi | 10.1109/ATS.2018.00025 | en_US |
dc.identifier.journal | 2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS) | en_US |
dc.citation.spage | 74 | en_US |
dc.citation.epage | 79 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000458678300014 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Conferences Paper |