Computer Science – Hardware Architecture
Scientific paper
2009-06-20
Computer Science
Hardware Architecture
6 pages, 1 figure
Scientific paper
This paper discusses the possible introduction of hidden reliability defects during CMOS foundry fabrication processes that may lead to accelerated wearout of the devices. These hidden defects or hardware Trojans can be created by deviation from foundry design rules and processing parameters. The Trojans are produced by exploiting time-based wearing mechanisms (HCI, NBTI, TDDB and EM) and/or condition-based triggers (ESD, Latchup and Softerror). This class of latent damage is difficult to test due to its gradual degradation nature. The paper describes life-time expectancy results for various Trojan induced scenarios. Semiconductor properties, processing and design parameters critical for device reliability and Trojan creation are discussed.
Clay W.
Papachristou Charalampos
Shiyanovskii Y.
Weyer D.
Wolff F.
No associations
LandOfFree
Exploiting Semiconductor Properties for Hardware Trojans does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Exploiting Semiconductor Properties for Hardware Trojans, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Exploiting Semiconductor Properties for Hardware Trojans will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-505038