ABSTRACT

In the two previous chapters, we have examined testing techniques for Trojan detection. Logic-testing based Trojan detection techniques are effective for small Trojans that do affect the circuit logic functionality, and side-channel analysis based testing techniques are effective for complex Trojans that affect the side-channel parameters (current signature, delay, etc.) substantially. However, there can be a third line-of-thought while somebody is trying to protect against hardware Trojans: what if the original circuit, by its very design, provides protection against Trojan insertion, or at least, resists attempts of Trojan insertion?