A Locating Method for Multi-Purposes HTs Based on the Boundary Network

Recently, there are various methods for detecting the hardware trojans (HTs) in the integrated circuits (ICs). The circuit's logic representations of different types, structures, and functional characteristics should be different. Each type of circuit has its' own performance characteristi...

Full description

Bibliographic Details
Main Authors: Chen Dong, Fan Zhang, Ximeng Liu, Xing Huang, Wenzhong Guo, Yang Yang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8784155/