Performance analysis of Hardware Trojan detection methods

Ehsan Sharifi, Kamal Mohammadiasl, Mehrdad Havasi, Amir Yazdani

Abstract


Due to the increasing use of information and communication technologies in most aspects of life, security of the information has drawn the attention of governments and industry as well as the researchers. In this regard, structural attacks on the functions of a chip are called hardware Trojans, and are capable of rendering ineffective the security protecting our systems and data. This method represents a big challenge for cyber-security as it is nearly impossible to detect with any currently practical detection scheme. Due to Various methods of this type of attack, many different methods are presented by the researchers to detect them. Each of these methods has been proposed different techniques to detect the Hardware Trojan horse, and are varied in terms of performance and conditions of use. In this paper, we survey the published methods and evaluate the strengths and weaknesses of each of them and analyze the efficiency of the proposed method to introduce efficient methods for Hardware Trojan horse detecting.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность MoNeTec 2024

ISSN: 2307-8162