Reusing logic masking to facilitate path-delay-based hardware Trojan detection.
Arash NejatDavid HélyVincent BeroullePublished in: IOLTS (2016)
Keyphrases
- hardware and software
- false positives
- digital circuits
- low cost
- detection algorithm
- detection method
- detection rate
- signal processing
- detection accuracy
- false alarms
- real time
- human visual system
- multi valued
- shortest path
- hardware implementation
- embedded systems
- destination node
- modal logic
- automatic detection
- anomaly detection
- logic programming
- object detection
- image processing