HIGHLIGHTS
- What: This study proposes a technique to make the IP core more resilient to hardware attacks by appending Physically Unclonable Functions (PUF) for signature analysis of the IP response. This approach demonstrated the engineering of power side channels that can cause leakage of information below the threshold limit. The major goal is to attempt to very likely identify the existence of a trojan by identifying its design`s overabundance on various design parameters, such as power or latency, in contrast to an uninfected circuit.
- Who: gerry from the Anil Neerukonda Institute of Technology and Sciences . . .

If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.