HARDWARE TROJAN INSERTION ON FPGA
This article introduces methods to insert different types of hardware Trojans into Xilinx FPGAs in a step by step manner. These infected FPGAs can be used for hardware Trojan related investigations and research. The topics included are Trojan insertion methods for targeting techniques for full activation, power-based, and delay-based detection, respectively.
This article assumes the reader has basic knowledge of HDL and some experience with FPGA design