Logic and Reduction Operation based Hardware Trojans in Digital Design

09/09/2022
by   Mayukhmali Das, et al.
0

In this paper, we will demonstrate Hardware Trojan Attacks on four different digital designs implemented on FPGA. The hardware trojan is activated based on special logical and reduction-based operations on vectors which makes the trojan-activity as silent and effective as possible. In this paper, we have introduced 5 novel trojan attack methodologies.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset