Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Stealthy Dopant-Level Hardware Trojans
#1
Quote:In this paper we propose an extremely stealthy approach  for  implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target  device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors.

https://www.emsec.rub.de/media/crypto/ve...tended.pdf

“If you think you are too small to make a difference, try sleeping with a mosquito.” - Dalai Lama XIV
Reply


Messages In This Thread
Stealthy Dopant-Level Hardware Trojans - by 1van - 04-16-2018, 09:17 AM

Forum Jump:


Users browsing this thread: 1 Guest(s)