scispace - formally typeset
Open AccessJournal ArticleDOI

A Survey of Hardware Trojan Taxonomy and Detection

TLDR
A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Abstract
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Hardware Trojan Attacks: Threat Analysis and Countermeasures

TL;DR: The threat of hardware Trojan attacks is analyzed; attack models, types, and scenarios are presented; different forms of protection approaches are discussed; and emerging attack modes, defenses, and future research pathways are described.
Journal ArticleDOI

A Comprehensive Study of Security of Internet-of-Things

TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
Journal ArticleDOI

A Primer on Hardware Security: Models, Methods, and Metrics

TL;DR: This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.
Journal ArticleDOI

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

TL;DR: A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Journal ArticleDOI

Quantum random number generators

TL;DR: This review discusses the current status of devices that generate quantum random numbers, and discusses the most fundamental processes based on elementary quantum mechanical processes.
References
More filters
Proceedings ArticleDOI

Trojan Detection using IC Fingerprinting

TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Proceedings ArticleDOI

Hardware Trojan detection using path delay fingerprint

TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Journal ArticleDOI

The Hunt For The Kill Switch

TL;DR: The Trust in Integrated Circuits (TIIC) program as discussed by the authors is a three-year initiative to verify the integrity of the military's integrated circuits, including the F-35.
Proceedings Article

Active hardware metering for intellectual property protection and security

TL;DR: The first active hardware metering scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy and runtime tampering is introduced and has a low-overhead in terms of power, delay, and area, while it is extremely resilient against the considered attacks.
Proceedings ArticleDOI

Detecting malicious inclusions in secure hardware: Challenges and solutions

TL;DR: The wide range of malicious alternations of ICs that are possible are explored and a general framework for their classification is proposed and the taxonomy is essential for properly evaluating the effectiveness of methods designed to detect Trojans.
Related Papers (5)