• Microelectronics
  • Vol. 53, Issue 3, 536 (2023)
WANG Peng1、2, XU Qing2, ZHANG Zhanhao2, WANG Zebin2, and JIN Zhiwei1、2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.13911/j.cnki.1004-3365.220272 Cite this Article
    WANG Peng, XU Qing, ZHANG Zhanhao, WANG Zebin, JIN Zhiwei. A Ring Oscillator Hardware Trojan Detection Method Based on Structure Optimization[J]. Microelectronics, 2023, 53(3): 536 Copy Citation Text show less
    References

    [4] LIU Y, ZHAO Y, HE J, et al. A novel test pattern optimization approach based on ring oscillator network [C] // 2017 IEEE 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). 2017, 1: 243-247.

    [5] MOEIN S, SUBRAMNIAN J, GULLIVER T A, et al. Classification of hardware trojan detection techniques [C] // 2015 IEEE Tenth International Conference on Computer Engineering & Systems (ICCES). 2015: 357-362.

    [6] TEHRANIPOOR M, KOUSHANFAR F. A survey of hardware trojan taxonomy and detection [J]. IEEE Design & Test of Computer, 2010, 27(1): 10-25.

    [7] ZHANG X, TEHRANIPOOR M. RON: an on-chip ring oscillator network for hardware Trojan detection [C] // 2011 IEEE Design, Automation & Test in Europe. 2011: 1-6.

    [8] KITSOS P, VOYIATZIS A G. FPGA trojan detection using length-optimized ring oscillators [C] // 2014 IEEE 17th Euromicro Conference on Digital System Design. 2014: 675-678.

    [9] HOQUE T, MUSTAPA M, AMSAAD F, et al. Assessment of NAND based ring oscillator for hardware trojan detection [C] // 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS). 2015: 1-4.

    [10] QIN Y, XIA T. Sensitivity analysis of ring oscillator based hardware trojan detection [C] // 2017 IEEE 17th International Conference on Communication Technology (ICCT). 2017: 1979-1983.

    [12] DEEPTHI S. Hardware trojan detection using ring oscillator [C] // 2021 IEEE 6th International Conference on Communication and Electronics Systems (ICCES). 2021: 362-368.

    [14] ZHANG X, FERRAIUOLO A, TEHRANIPOOR M. Detection of trojans using a combined ring oscillator network and off-chip transient power analysis [J]. ACM Journal on Emerging Technologies in Computing Systems, 2013, 9(3): 1-20.

    [16] JIN Y, KUPP N, MAKRIS Y. Experiences in hardware trojan design and implementation [C] // 2009 IEEE International Workshop on Hardware-Oriented Security and Trust. 2009: 50-57.

    WANG Peng, XU Qing, ZHANG Zhanhao, WANG Zebin, JIN Zhiwei. A Ring Oscillator Hardware Trojan Detection Method Based on Structure Optimization[J]. Microelectronics, 2023, 53(3): 536
    Download Citation