A Survey of Hardware Trojan Taxonomy and Detection
TLDR
A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.Abstract:
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.read more
Citations
More filters
Journal ArticleDOI
Hardware Trojan Attacks: Threat Analysis and Countermeasures
TL;DR: The threat of hardware Trojan attacks is analyzed; attack models, types, and scenarios are presented; different forms of protection approaches are discussed; and emerging attack modes, defenses, and future research pathways are described.
Journal ArticleDOI
A Comprehensive Study of Security of Internet-of-Things
Arsalan Mosenia,Niraj K. Jha +1 more
TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
Journal ArticleDOI
A Primer on Hardware Security: Models, Methods, and Metrics
TL;DR: This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.
Journal ArticleDOI
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
TL;DR: A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Journal ArticleDOI
Quantum random number generators
TL;DR: This review discusses the current status of devices that generate quantum random numbers, and discusses the most fundamental processes based on elementary quantum mechanical processes.
References
More filters
Proceedings ArticleDOI
Trojan Detection using IC Fingerprinting
TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Proceedings ArticleDOI
Hardware Trojan detection using path delay fingerprint
Yier Jin,Yiorgos Makris +1 more
TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Journal ArticleDOI
The Hunt For The Kill Switch
TL;DR: The Trust in Integrated Circuits (TIIC) program as discussed by the authors is a three-year initiative to verify the integrity of the military's integrated circuits, including the F-35.
Proceedings Article
Active hardware metering for intellectual property protection and security
TL;DR: The first active hardware metering scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy and runtime tampering is introduced and has a low-overhead in terms of power, delay, and area, while it is extremely resilient against the considered attacks.
Proceedings ArticleDOI
Detecting malicious inclusions in secure hardware: Challenges and solutions
TL;DR: The wide range of malicious alternations of ICs that are possible are explored and a general framework for their classification is proposed and the taxonomy is essential for properly evaluating the effectiveness of methods designed to detect Trojans.