David Hely
Home
Publications
Research
Teaching
Contact
Reusing logic masking to facilitate path-delay-based hardware Trojan detection
A. Nejat
,
D. Hely
,
V. Beroulle
July 2016
Cite
DOI
Type
Conference paper
Publication
2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS)
logic masking
integrated circuit
logic design
design-for-hardware-trust
Hardware Trojan detection
IC piracy
integrated circuit design
path delay analysis
untrusted foundries
DFHT method
facilitate path-delay-based hardware Trojan detection
HT detection
Manganese
Robustness
System analysis and design
Testing
Cite
×