Design Techniques for Hardware Trojans Prevention and Detection at the Register-Transfer Level

2018 
Outsourcing design development and extensive usage of untrusted intellectual properties make modern complex designs highly susceptible to hardware Trojan insertion at the register-transfer level. As existing pre-silicon verification techniques are not designed toward hardware Trojans, there is need for hardware Trojan prevention and detection techniques at the register-transfer level to ensure the trustworthiness of designs. This chapter reviews and discusses some of proposed techniques for hardware Trojan prevention and detection at the register-transfer level.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    4
    References
    0
    Citations
    NaN
    KQI
    []