Articles with "transfer level" as a keyword



Detecting Unknown Hardware Trojans in Register Transfer Level Leveraging Verilog Conditional Branching Features

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3272034

Abstract: Hardware Trojans have concealed modifications to integrated circuits (ICs) that can alter their functions, performance, or security properties. Existing Trojan detection methods are designed primarily to detect Trojans at the gate-level IC abstraction and lower… read more here.

Keywords: hardware trojans; register transfer; level; detection ... See more keywords

GNN-Based Hardware Trojan Detection at Register Transfer Level Leveraging Multiple-Category Features

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2024.3513218

Abstract: The existing hardware Trojan (HT) detection technology usually relies on the golden reference model. With the continuous improvement of circuit integration, the detection accuracy of traditional methods such as side-channel analysis has declined. Methods based… read more here.

Keywords: detection; hardware trojan; trojan detection; transfer level ... See more keywords