ABSTRACT

In Chapter-14, we saw an example of the application of logic testing in detecting hardware Trojans. However, it was mentioned and shown that such a technique, while effective for simple and ultra-small Trojan circuits (consisting of a few gates) with simple trigger conditions, generally finds its difficult to effectively detect larger Trojans with complex trigger conditions. In addition, logic testing based techniques are simply unable to detect Trojans which do not affect the logic functionality of the original circuit.