• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Xiao, Yuxuan (Xiao, Yuxuan.) | Feng, Shiwei (Feng, Shiwei.) (Scholars:冯士维)

Indexed by:

EI Scopus

Abstract:

The FPGA can customize the array of internal logic at will, and can be programmed in real time at the user's site to modify the internal hardware logic to achieve any logic function. This is impossible for ASIC and DSP. In this setting, hardware Trojan is a malicious circuit intentionally implanted in a chip or electronic system or a defective module left unintentionally by the designer. Under special conditions, the module can be used by attackers to achieve destructive functions. The inserted hardware Trojan may cause information leakage, change the circuit function, and even destroy the circuit. In this paper, we use Ring Oscillator (RO) to construct a ring oscillator network (RON) and monitor the power supply of whole FPGA device. This method applies the frequency of the ring oscillator as a sensitive factor to facilitate the non-destructive detection of the location of the Trojan. © 2020 IEEE.

Keyword:

Hardware security Computer hardware Field programmable gate arrays (FPGA) Malware Rings (components) Software engineering

Author Community:

  • [ 1 ] [Xiao, Yuxuan]Beijing University of Technology, China
  • [ 2 ] [Feng, Shiwei]Beijing University of Technology, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Year: 2020

Page: 410-413

Language: English

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Online/Total:2967/10655012
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.