<P><STRONG><FONT size=4> </FONT></STRONG></P> <P style=″MARGIN–TOP: 0px; MARGIN–LEFT: 20px″ align=left>Theme: Trojan Detection and Isolation</P><FONT face=Times–Roman size=3> <P class=MsoNormal style=″MARGIN–LEFT: 20px″><SPAN style=″FONT–SIZE: 11pt; FONT–FAMILY: Arial″>Chip design and fabrication is becoming increasingly vulnerable to malicious activities and alternations with globalization. This has raised serious concerns regarding possible threats to military systems, financial infrastruc–tures and even household appliances. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time (Time Bomb) or the Trojan may serve to leak confidential information covertly to the adversary. Trojans can be implemented as hardware modifications to ASICs, COTS, microprocessors, or DSPs, or as firmware modifications, e.g., to FPGA bitstreams. Trojans are cleverly concealed to prevent accidental discovery during validation and manufacturing test. Therefore, existing </SPAN></P></FONT><B></B> <P><B>Keywords:</B> <TABLE id=AutoNumber2 style=″BORDER–COLLAPSE: collapse″ borderColor=#bcd0dc cellSpacing=0 cellPadding=0 width=″91%″ border=1> <TBODY> <TR> <TD vAlign=top width=″52%″><FONT face=Times–Bold size=3> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Trojan detection and isolation</P> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Authenicating foundry of origin</P> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Side channel analysis/attacks</P> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Watermarking</P> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>IP security/FPGA design security <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 4px; MARGIN–LEFT: 20px″ align=left>Cryptographic techniques for hardware security <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left></FONT></P></TD> <TD vAlign=top width=″48%″><FONT face=Times–Bold size=3> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Physical unclonable functions (PUFs)</P> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Embedded and distributed systems security</P> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Hardware intrusion detection and prevention</P> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Security engineering</P> <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left>Scan–chain encryption <P style=″MARGIN–TOP: 0px; MARGIN–BOTTOM: 0px; MARGIN–LEFT: 20px″ align=left></FONT></P></TD></TR></TBODY></TABLE></P>
Abbrevation
HOST
City
Anaheim
Country
United States
Deadline Paper
Start Date
End Date
Abstract