@conference {18476, title = {A survey on hardware trojan detection techniques}, booktitle = {IEEE International Symposium on Circuits and Systems (ISCAS) 2015}, year = {2015}, month = {08/2015}, pages = {2021-2024}, publisher = {IEEE}, organization = {IEEE}, edition = {2015}, address = {Lisbon, Portugal}, abstract = {Hardware Trojans recently emerged as a serious issue for computer systems, especially for those used in critical applications such as medical or military. Trojan proposed so far can affect the reliability of a device in various ways. Proposed effects range from the leakage of secret information to the complete malfunctioning of the device. A crucial point for securing the overall operation of a device is to guarantee the absence of hardware Trojans. In this paper, we survey several techniques for detecting malicious modification of circuit introduced at different phases of the design flow. We also highlight their capabilities limitations in thwarting hardware Trojans.}, keywords = {hardware Trojan detection techniques, integrated circuit reliability}, isbn = {978-1-4799-8391-9}, issn = {0271-4302}, doi = {10.1109/ISCAS.2015.7169073}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7152138}, author = {Bhasin, Shivam and Regazzoni, Francesco} }