Abstract

Hardware Trojan detection is a very important topic especially as parts of critical systems which are designed and/or manufactured by untrusted third parties. Most of the current research concentrates on detecting Trojans at the testing phase by comparing the suspected circuit to a golden (trusted) one. However, these attempts do not work in the case of third party IPs, which are black boxes with no golden IPs to trust. In this work, we present novel methods for system protection that alleviate the need for a golden chip. Protection against injected Trojan is done using simple blockage method. We show the practicality of the introduced schemes by providing a proof of concept implementation of the proposed methodology on FPGA. We showed that the overhead is low enough in the simple blockage method. The delay overhead is negligible while the power overhead does not exceed 2%.

Keywords:
Hardware Trojan Trojan Overhead (engineering) Computer science Field-programmable gate array Simple (philosophy) Embedded system Computer security Third party Operating system Internet privacy

Metrics

16
Cited By
1.40
FWCI (Field Weighted Citation Impact)
22
Refs
0.84
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
Integrated Circuits and Semiconductor Failure Analysis
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Neuroscience and Neural Engineering
Life Sciences →  Neuroscience →  Cellular and Molecular Neuroscience
© 2026 ScienceGate Book Chapters — All rights reserved.