SOFTWARE IMPLEMENTATION OF IC TOPOLOGY TRANSFORMATIONS FOR PROTECTION AGAINST HARDWARE TROJANS
This article focuses on software methods for detecting and preventing the introduction of hardware trojans into the topology of integrated circuits at the design stage. An additional recommendation for typical procedures of receiving GDSII files that significantly complicates the introduction of HTs...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Kragujevac
2023-09-01
|
Series: | Proceedings on Engineering Sciences |
Subjects: | |
Online Access: | https://pesjournal.net/journal/v5-n3/5.pdf |