SOFTWARE IMPLEMENTATION OF IC TOPOLOGY TRANSFORMATIONS FOR PROTECTION AGAINST HARDWARE TROJANS

This article focuses on software methods for detecting and preventing the introduction of hardware trojans into the topology of integrated circuits at the design stage. An additional recommendation for typical procedures of receiving GDSII files that significantly complicates the introduction of HTs...

Full description

Bibliographic Details
Main Authors: Evgeniy Pevtsov, Tatiana Demenkova, Alexander Sigov, Alexander Shnyakin, Semyon Moskolenko
Format: Article
Language:English
Published: University of Kragujevac 2023-09-01
Series:Proceedings on Engineering Sciences
Subjects:
Online Access:https://pesjournal.net/journal/v5-n3/5.pdf