A study on the effectiveness of Trojan detection techniques using a red team blue team approach

X. Zhang, K. Xiao, M. Tehranipoor, J. Rajendran, R. Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

As part of the Embedded Systems Challenge, we assess the effectiveness of Trojan detection techniques. The red team inserted different types of Trojans - combinational, sequential, reliability degrading, and performance degrading - into selected variants of a target design; the other variants are Trojan-free. The blue team has to correctly classify the Trojan-free and Trojan-infected variants. Seven different teams from six different universities performed the blue team activity using different types of Trojan-detection techniques, namely activation-based detection, and power- and delay-based side-channels.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013
DOIs
StatePublished - 2013
Event2013 IEEE 31st VLSI Test Symposium, VTS 2013 - Berkeley, CA, United States
Duration: Apr 29 2013May 1 2013

Publication series

NameProceedings of the IEEE VLSI Test Symposium

Other

Other2013 IEEE 31st VLSI Test Symposium, VTS 2013
CountryUnited States
CityBerkeley, CA
Period4/29/135/1/13

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'A study on the effectiveness of Trojan detection techniques using a red team blue team approach'. Together they form a unique fingerprint.

Cite this