A study on the effectiveness of trojan detection techniques using a red team blue team approach Conference Paper uri icon

abstract

  • As part of the Embedded Systems Challenge, we assess the effectiveness of Trojan detection techniques. The red team inserted different types of Trojans - combinational, sequential, reliability degrading, and performance degrading - into selected variants of a target design; the other variants are Trojan-free. The blue team has to correctly classify the Trojan-free and Trojan-infected variants. Seven different teams from six different universities performed the blue team activity using different types of Trojan-detection techniques, namely activation-based detection, and power- and delay-based side-channels. 2013 IEEE.

name of conference

  • 2013 IEEE 31st VLSI Test Symposium (VTS)

published proceedings

  • 2013 IEEE 31st VLSI Test Symposium (VTS)

author list (cited authors)

  • Zhang, X., Xiao, K., Tehranipoor, M., Rajendran, J., & Karri, R.

citation count

  • 15

complete list of authors

  • Zhang, X||Xiao, K||Tehranipoor, M||Rajendran, J||Karri, R

publication date

  • April 2013