DOI:10.20894/IJWT.
Periodicity: Bi Annual.
Impact Factor:
SJIF:4.78 & GIF:0.428
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJWT provides online manuscript tracking system.

Every issue of Journal of IJWT is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJWT special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJWT website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 6 Issue 1 Date of Publication:   June 2017

Hardware Trojan Detection and Prevention Using Pattern Matching Technique Along With Dummy Logic

G.Alamelu,P. Sridevi

Page(s):   11-14 ISSN:   2278-2397
DOI:   10.20894/IJWT.104.006.001.004 Publisher:   Integrated Intelligent Research (IIR)


  1. C. Albrecht,   "Iwls 2005benchmarks",   Workshop for Logic Synthesis (IWLS)   ,2005
    View Artical

  2. H. Asadi and M. B. Tahoori,   "Analytical techniques for soft error rate modeling and mitigation of FPGA-based designs",   IEEE Trans. Very Large Scale Integr   ,Vol.15   ,2007
    View Artical

  3. C. Beckhoff, D. Koch, and J. Torresen,   "The xilinx design language (xdl): Tutorial and use cases",   IEEE Int.Workshop Reconfigurable Commu.-Centric Sy
    View Artical

  4. F. Benz, A. Seffrin, and S. A. Huss,   "Bil: A tool-chain for bitstream reverse-engineering   ,2012
    View Artical

  5. A. Canis, J. Choi, M. Aldham, V. Zhang, A. Kammoona,J. H. Anderson, S. Brown, and T. Czajkowski,   "Legup:High-level synthesis for fpga-based processor/accelerator systems   ,2011
    View Artical

  6. R. S. Chakraborty, S. Narasimhan, and S. Bhunia,   "Hardware trojan: Threats and emerging solutions",   Proc. IEEE Int. High Level Design Validation Test    ,2009
    View Artical

  7. R. Chakraborty, I. Saha, A. Palchaudhuri, and G. Naik,   "Hardware trojan insertion by direct modification of fpga configuration bitstream   ,Vol.30   ,2013
    View Artical

  8. S. Drimer,   "Security for Volatile FPGAs",   University of Cambridge, Computer Laboratory, Rapp   ,2009
    View Artical

  9. R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor,   "Trustworthy hardware: Identifying and classifying hardware trojans",   Computer   ,2010
    View Artical

  10. A. Moradi, A. Barenghi, T. Kasper, and C. Paar,   "On the vulnerability of fpga bitstream encryption against power analysis attacks: Extracting keys fr",   Proc. 18th ACM Conf. Comput.Commun. Security   ,2011
    View Artical

  11. J.-B. Note and E. Rannaud,,   "From the bitstream to the netlist   ,Vol.8   ,2008
    View Artical

  12. M. Potkonjak,   "Synthesis of trustable ics using untrusted cad tools   ,2010
    View Artical

  13. J. Rilling, D. Graziano, J. Hitchcock, T. Meyer, X. Wang, P. Jones, and J. Zambreno,   "Circumventing a ring oscillator approach to fpga-based hardware trojan detection   ,2011
    View Artical

  14. H. Salmani and M. Tehranipoor,   "Analyzing circuit vulnerability to hardware trojan insertion at the behavioral level   ,2013
    View Artical

  15. M. Tehranipoor and F. Koushanfar,   "A survey of hardware trojan taxonomy and detection",   IEEE Des   ,Vol.27   ,2010
    View Artical

  16. K. Xiao and M. Tehranipoor,   "Bisa: Built-in self-authentication for preventing hardware trojan insertion",   IEEE HOST   ,2013
    View Artical

  17. User Guide, Xilinx,   "Virtex-II platform FPGA User Guide   ,2005
    View Artical

  18. Data Sheet, Xilinx,   "Virtex-II Platform FPGAs: Complete Data Sheet   ,2007
    View Artical

  19. J. X. Zheng, E. Chen, and M. Potkonjak,   "A benign hardware trojan on fpga-based embedded systems   ,2012
    View Artical

  20. M. Attig and J. Lockwood,   "A Framework for Rule Processing in Reconfigurable Network Systems",   IEEE Symposium on Field-Programmable Custom Comput   ,2005
    View Artical

  21. M. Attig and J. Lockwood,   "SIFT: Snort Intrusion Filter for TCP",   IEEE Symposium on High Speed Interconnects   ,2005
    View Artical

  22. Z. K. Baker and V. K. Prassanna,   "A Computationally Efficient Engine for Flexible Intrusion Detection",   IEEE transactions on very large scale integration    ,Vol.13   ,2005
    View Artical

  23. R. Bejtlich.,   "Extrusion Detection: Security Monitoring for Internal Intrusions",   Addison Wesley   ,2006
    View Artical

  24. B. Bloom.,   "Space/Time Trade-offs in Hash Coding with Allowable Errors",   Communications of the ACM   ,1970
    View Artical

  25. S. Dharmapurikar, P. Krishnamurthy, T. Sproull, J. Lockwood,   "Deep Packet Inspection using Parallel Bloom Filters Bloom Filters : A Tutorial",   Analysis, and Survey by James Blustein and Amal El
    View Artical

  26. J. W. Lockwood, N. Naufel, J. S. Turner, and D. E. Taylor,   "Reprogrammable Network PacketProcessing on the Field Programmable Port Extender (FPX)",   International Symposium on Field Programmable Gate   ,2001
    View Artical

  27. M. Mitzenmacher,   "Compressed Bloom Filters",   IEEE/ACM transactions on networking   ,Vol.10   ,2002
    View Artical

  28. M.V. Ramakrishna,   "A Simple Perfect Hashing Method for Static Sets",   Proceedings of the Fourth International Conference   ,1992
    View Artical

  29. H. Song and J. Lockwood,   "Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems",   IEEE Globecom   ,2005
    View Artical

  30. C. Albrecht,   "Iwls 2005benchmarks",   Workshop for Logic Synthesis (IWLS)   ,Vol.    ,2005
    View Artical

  31. H. Asadi and M. B. Tahoori,   "Analytical techniques for soft error rate modeling and mitigation of FPGA-based designs",   IEEE Trans. Very Large Scale Integr   ,Vol.15   ,Issue 12   ,2007
    View Artical

  32. C. Beckhoff, D. Koch, and J. Torresen,   "The xilinx design language (xdl): Tutorial and use cases",   IEEE Int.Workshop Reconfigurable Commu.-Centric Sy   ,Vol.    ,2008
    View Artical

  33. F. Benz, A. Seffrin, and S. A. Huss,   "Bil: A tool-chain for bitstream reverse-engineering",   Field Programmable Logic and Applications (FPL)   ,Vol.    ,Issue    ,2012
    View Artical

  34. A. Canis, J. Choi, M. Aldham, V. Zhang, A. Kammoona,J. H. Anderson, S. Brown, and T. Czajkowski,   "Legup:High-level synthesis for fpga-based processor/accelerator systems",   Proceedings of the 19th ACM/SIGDA international sy   ,Vol.    ,2011
    View Artical

  35. R. S. Chakraborty, S. Narasimhan, and S. Bhunia,   "Hardware trojan: Threats and emerging solutions",   Proc. IEEE Int. High Level Design Validation Test    ,Vol.    ,2009
    View Artical

  36. R. Chakraborty, I. Saha, A. Palchaudhuri, and G. Naik,   "Hardware trojan insertion by direct modification of fpga configuration bitstream",   IEEE Design & Test   ,Vol.30   ,Issue 2   ,2013
    View Artical

  37. S. Drimer,   "Security for Volatile FPGAs",   University of Cambridge, Computer Laboratory, Rapp   ,Vol.    ,2009
    View Artical

  38. R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor,   "Trustworthy hardware: Identifying and classifying hardware trojans",   Computer   ,Vol.43   ,Issue 10   ,2010
    View Artical

  39. A. Moradi, A. Barenghi, T. Kasper, and C. Paar,   "On the vulnerability of fpga bitstream encryption against power analysis attacks",   Proc. 18th ACM Conf. Comput.Commun. Security   ,Vol.    ,2011
    View Artical

  40. J.-B. Note and E. Rannaud,,   "From the bitstream to the netlist",   Proceedings of the 16th international ACM/SIGDA sy   ,Vol.8   ,2008
    View Artical

  41. M. Potkonjak,   "Synthesis of trustable ics using untrusted cad tools",   Design Automation Conference (DAC)   ,Vol.    ,2010
    View Artical

  42. J. Rilling, D. Graziano, J. Hitchcock, T. Meyer, X. Wang, P. Jones, and J. Zambreno,   "Circumventing a ring oscillator approach to fpga-based hardware trojan detection",   Design Automation Conference (DAC)   ,Vol.    ,2011
    View Artical

  43. H. Salmani and M. Tehranipoor,   "Analyzing circuit vulnerability to hardware trojan insertion at the behavioral level",   Computer Design (ICCD)   ,Vol.10   ,2013
    View Artical

  44. M. Tehranipoor and F. Koushanfar,   "A survey of hardware trojan taxonomy and detection",   IEEE Des   ,Vol.45   ,Issue 5   ,2010
    View Artical

  45. K. Xiao and M. Tehranipoor,   "Bisa: Built-in self-authentication for preventing hardware trojan insertion",   IEEE HOST   ,2013
    View Artical

  46. Data Sheet, Xilinx,   "Virtex-II Platform FPGAs: Complete Data Sheet   ,2007
    View Artical

  47. J. X. Zheng, E. Chen, and M. Potkonjak,   "A benign hardware trojan on fpga-based embedded systems",   Field Programmable Logic and Applications (FPL)   ,Vol.47   ,Issue 6   ,2012
    View Artical

  48. M. Attig and J. Lockwood,   "A Framework for Rule Processing in Reconfigurable Network Systems",   IEEE Symposium on Field-Programmable Custom Comput   ,Vol.    ,2005
    View Artical

  49. M. Attig and J. Lockwood,   "SIFT: Snort Intrusion Filter for TCP",   IEEE Symposium on High Speed Interconnects   ,Vol.13   ,Issue 7   ,2005
    View Artical

  50. Z. K. Baker and V. K. Prassanna,   "A Computationally Efficient Engine for Flexible Intrusion Detection",   IEEE transactions on very large scale integration    ,Vol.13   ,Issue 10   ,2005
    View Artical

  51. B. Bloom.,   "Space/Time Trade-offs in Hash Coding with Allowable Errors",   Communications of the ACM   ,Vol.13   ,Issue 7   ,1970
    View Artical

  52. S. Dharmapurikar, P. Krishnamurthy, T. Sproull, J. Lockwood,   "Deep Packet Inspection using Parallel Bloom Filters Bloom Filters : A Tutorial",   Analysis, and Survey by James Blustein and Amal El   ,Vol.13   ,Issue 7
    View Artical

  53. J. W. Lockwood, N. Naufel, J. S. Turner, and D. E. Taylor,   "Reprogrammable Network PacketProcessing on the Field Programmable Port Extender (FPX)",   International Symposium on Field Programmable Gate   ,Vol.    ,2001
    View Artical

  54. M. Mitzenmacher,   "Compressed Bloom Filters",   IEEE/ACM transactions on networking   ,Vol.10   ,Issue 5   ,2002
    View Artical

  55. M.V. Ramakrishna,   "A Simple Perfect Hashing Method for Static Sets",   Proceedings of the Fourth International Conference   ,Vol.23   ,Issue 1   ,1992
    View Artical

  56. H. Song and J. Lockwood,   "Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems",   IEEE Globecom   ,Vol.    ,2005
    View Artical

  57. C. Beckhoff, D. Koch, and J. Torresen,   "The xilinx design language (xdl): Tutorial and use cases",   IEEE Int.Workshop Reconfigurable Commu.-Centric Sy   ,Vol.
    View Artical

  58. A. Canis, J. Choi, M. Aldham, V. Zhang, A. Kammoona,J. H. Anderson, S. Brown, and T. Czajkowski,   "Legup:High-level synthesis for fpga-based processor/accelerator systems",   Proceedings of the 19th ACM/SIGDA international sy   ,Vol.    ,2011
    View Artical

  59. R. Chakraborty, I. Saha, A. Palchaudhuri, and G. Naik,   "Hardware trojan insertion by direct modification of fpga configuration bitstream   ,Vol.30   ,2013
    View Artical

  60. R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor,   "Trustworthy hardware: Identifying and classifying hardware trojans",   Computer   ,Vol.43   ,Issue 10   ,2010
    View Artical

  61. A. Moradi, A. Barenghi, T. Kasper, and C. Paar,   "On the vulnerability of fpga bitstream encryption against power analysis attacks: Extracting keys fr",   Proc. 18th ACM Conf. Comput.Commun. Security   ,Vol.    ,2011
    View Artical

  62. J.-B. Note and E. Rannaud,,   "From the bitstream to the netlist   ,Vol.8   ,2008
    View Artical

  63. M. Potkonjak,   "Synthesis of trustable ics using untrusted cad tools",   Design Automation Conference (DAC)   ,Vol.    ,2010
    View Artical

  64. J. Rilling, D. Graziano, J. Hitchcock, T. Meyer, X. Wang, P. Jones, and J. Zambreno,   "Circumventing a ring oscillator approach to fpga-based hardware trojan detection",   Computer Design (ICCD)   ,Vol.43   ,Issue 10   ,2011
    View Artical

  65. H. Salmani and M. Tehranipoor,   "Analyzing circuit vulnerability to hardware trojan insertion at the behavioral level",   Defect and Fault Tolerance in VLSI and Nanotechnol   ,Vol.    ,Issue 25-Oct   ,2013
    View Artical

  66. M. Tehranipoor and F. Koushanfar,   "A survey of hardware trojan taxonomy and detection",   IEEE Des   ,Vol.27   ,Issue 1   ,2010
    View Artical

  67. J. X. Zheng, E. Chen, and M. Potkonjak,   "A benign hardware trojan on fpga-based embedded systems",   Field Programmable Logic and Applications (FPL)   ,Vol.47   ,Issue 6   ,2012
    View Artical

  68. Z. K. Baker and V. K. Prassanna,   "A Computationally Efficient Engine for Flexible Intrusion Detection",   IEEE transactions on very large scale integration    ,Vol.13   ,Issue 10   ,2005
    View Artical

  69. S. Dharmapurikar, P. Krishnamurthy, T. Sproull, J. Lockwood,   "Deep Packet Inspection using Parallel Bloom Filters Bloom Filters : A Tutorial",   Analysis, and Survey by James Blustein and Amal El   ,Vol.13   ,Issue 7   ,1970
    View Artical

  70. J. W. Lockwood, N. Naufel, J. S. Turner, and D. E. Taylor,   "Reprogrammable Network PacketProcessing on the Field Programmable Port Extender (FPX)",   International Symposium on Field Programmable Gate   ,Vol.10   ,Issue    ,2001
    View Artical

  71. M. Mitzenmacher,   "Compressed Bloom Filters",   IEEE/ACM transactions on networking   ,Vol.10   ,Issue 5   ,2002
    View Artical

  72. M.V. Ramakrishna,   "A Simple Perfect Hashing Method for Static Sets",   Proceedings of the Fourth International Conference   ,Vol.23   ,Issue 1   ,1992
    View Artical