Abbrevation
HOST
City
Anaheim
Country
United States
Deadline Paper
Start Date
End Date
Abstract

<P><STRONG><FONT size=4> </FONT></STRONG></P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Theme: Trojan Detection and Isolation</P><FONT face=Times&#8211;Roman size=3> <P class=MsoNormal style=&#8243;MARGIN&#8211;LEFT: 20px&#8243;><SPAN style=&#8243;FONT&#8211;SIZE: 11pt; FONT&#8211;FAMILY: Arial&#8243;>Chip design and fabrication is becoming increasingly vulnerable to malicious activities and alternations with globalization&#046; This has raised serious concerns regarding possible threats to military systems, financial infrastruc&#8211;tures and even household appliances&#046; An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time (Time Bomb) or the Trojan may serve to leak confidential information covertly to the adversary&#046; Trojans can be implemented as hardware modifications to ASICs, COTS, microprocessors, or DSPs, or as firmware modifications, e&#046;g&#046;, to FPGA bitstreams&#046; Trojans are cleverly concealed to prevent accidental discovery during validation and manufacturing test&#046; Therefore, existing </SPAN></P></FONT><B></B> <P><B>Keywords:</B> <TABLE id=AutoNumber2 style=&#8243;BORDER&#8211;COLLAPSE: collapse&#8243; borderColor=#bcd0dc cellSpacing=0 cellPadding=0 width=&#8243;91%&#8243; border=1> <TBODY> <TR> <TD vAlign=top width=&#8243;52%&#8243;><FONT face=Times&#8211;Bold size=3> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Trojan detection and isolation</P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Authenicating foundry of origin</P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Side channel analysis/attacks</P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Watermarking</P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>IP security/FPGA design security <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 4px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Cryptographic techniques for hardware security <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left></FONT></P></TD> <TD vAlign=top width=&#8243;48%&#8243;><FONT face=Times&#8211;Bold size=3> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Physical unclonable functions (PUFs)</P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Embedded and distributed systems security</P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Hardware intrusion detection and prevention</P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Security engineering</P> <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left>Scan&#8211;chain encryption <P style=&#8243;MARGIN&#8211;TOP: 0px; MARGIN&#8211;BOTTOM: 0px; MARGIN&#8211;LEFT: 20px&#8243; align=left></FONT></P></TD></TR></TBODY></TABLE></P>