Validating the Claim - Defeating HaTCh : Building Malicious IP cores

09/18/2018
by   Anshu Bhardwaj, et al.
0

This paper defends the design of hardware Trojan proposed in the paper "Defeating HaTCh: Building Malicious IP Cores" by defining the four critical properties which are required to be satisfied to classify it to belong to class of Deterministic Hardware Trojan. This is to counter the claims of authors of HaTCh in their paper "Comments on Defeating HaTCh".

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset

Sign in with Google

×

Use your Google Account to sign in to DeepAI

×

Consider DeepAI Pro