To detect hardware Trojan I inserted in my circuit, first I have to trigger it, then try to detect it. What is the practical tool or s/w i have to use to generate test patterns or vector, so that my Trojan will get triggered?
Well a hardware Trojan is design based on its triggering mechanism. First you
have to find a way how to trigger it. For example you can youse timebased
triggering technique like after some clock cycle the trojan will be activated or
using combination of the input lines. Stealthyness of your Trojan is also depends on
this triggering mechanism.
You can follow http://www.iacr.org/archive/ches2009/57470397/57470397.pdf
And this one too
http://ev.fe.uni-lj.si/5-2013/Fang.pdf
COVID 19 pandemic has shaken the roots of World in all aspects. Infections, Deaths, inability to create facilities, stress upon front-line workers, restrictions and unusual adaptation in...
19 April 2021 8,351 23 View
Hi all, Is it possible to read-back from an already programmed FPGA? If possible, kindly explain the technique with EDA-CAD tool support for this operation. Thanks in advance.
20 September 2018 5,100 5 View
Hi All, It is well known that Hardware Trojans known so far actually have knowledge of the algorithm and use side channel analysis to leak the keys. To prevent side channel analysis, logic...
20 September 2018 6,461 1 View
Hi all, Does PUF stop side channel attacks?? If so, how does PUF stop side channel analysis based on timing differences or power differences?? Thanks in advance..
20 September 2018 1,254 2 View
In the viscosity measurements for the extracts from oats, I want to calculate the MW. I would like to know about the value of K and a for using in Mark-Hauwink -Kuhn equation.
22 November 2016 6,252 2 View
I want to modify the fitness function of Genetic Search in Weka tool.
08 May 2016 5,495 4 View
HI, Good Day to all... In digital design, i want to insert control logic or lock mechanism at internal nets. As far as i know, inserting control logic or lock mechanism at High fan-out nets is the...
27 August 2015 6,905 10 View
Thanks in advance for your replies.
06 January 2015 2,670 7 View
I am using Xilinx ISE 12.2 version. Even after implementation, .ncd file is not available in the project folder. I want to know whether it is because of any setting changes? Do any of you face the...
02 July 2014 9,130 7 View
I want to use synopsys/cadence tools such as synopsys design compiler, synopsys prime time, cadence SoC encounter for place and route and synopsys tetramax ATPG. Are any of the mentioned tools...
28 May 2014 3,356 8 View
I have face this problem anyone help me how to solve this issue ?which is below Fatal error: There are inconsistent shifts over periodic boundaries in a molecule type consisting of 78 atoms. The...
07 August 2024 2,598 1 View
Hello, Can anyone provide me with the absorption coefficient of methane gas at 7.7 um? Any reference?
06 August 2024 980 5 View
What should a Mechanical Engineering PhD scholar focus on during their PhD to enhance their chances of securing a postdoctoral position?
29 July 2024 7,714 4 View
I am using CuBr/THPTA for a click reaction in total cell lysates. I am facing issues with my protein sample in non-reducing SDS-PAGE where it's not migrating properly and most of it remains at the...
29 July 2024 950 4 View
I know the difference between instrumental LOD and method LOD but my query is - in case of any sample whose concentration is zero or not detected by the instrumental LOD, is it possible to get...
24 July 2024 6,592 5 View
What is climate resilience for food security and sustainable agriculture and how is smart irrigation in agriculture climate resilient?
22 July 2024 1,947 0 View
I am performing fluorescence experiments using a ligand to detect metal ions. I want to determine the Lowest Detection Limit (LOD) using the formula LOD = 3σ / K. However, I'm uncertain about...
19 July 2024 1,086 1 View
I am working on flourescence sensing of heavy metals using quantum dots.Can any of you suggest how to find the detection limit. Whether it is calculated from formula or we can get from instrument?
19 July 2024 7,411 3 View
Dear Colleagues, I hope this message finds you well. My name is Noor Al-Huda K. Hussein,and I am a researcher specializing in deep learning applications in genetic data analysis. I am currently...
18 July 2024 5,562 0 View
Anomaly detection in scanned image data set
18 July 2024 3,578 3 View