scispace - formally typeset
Journal ArticleDOI

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Reads0
Chats0
TLDR
The threat of hardware Trojan attacks is analyzed; attack models, types, and scenarios are presented; different forms of protection approaches are discussed; and emerging attack modes, defenses, and future research pathways are described.
Abstract
Security of a computer system has been traditionally related to the security of the software or the information being processed. The underlying hardware used for information processing has been considered trusted. The emergence of hardware Trojan attacks violates this root of trust. These attacks, in the form of malicious modifications of electronic hardware at different stages of its life cycle, pose major security concerns in the electronics industry. An adversary can mount such an attack with an objective to cause operational failure or to leak secret information from inside a chip-e.g., the key in a cryptographic chip, during field operation. Global economic trend that encourages increased reliance on untrusted entities in the hardware design and fabrication process is rapidly enhancing the vulnerability to such attacks. In this paper, we analyze the threat of hardware Trojan attacks; present attack models, types, and scenarios; discuss different forms of protection approaches, both proactive and reactive; and describe emerging attack modes, defenses, and future research pathways.

read more

Citations
More filters
Journal ArticleDOI

A Comprehensive Study of Security of Internet-of-Things

TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
Journal ArticleDOI

Hardware Trojans: Lessons Learned after One Decade of Research

TL;DR: This article examines the research on hardware Trojans from the last decade and attempts to capture the lessons learned and identifies the most critical lessons for those new to the field and suggests a roadmap for future hardware Trojan research.

Overcoming an untrusted computing base: detecting and removing malicious hardware automatically

TL;DR: This paper proposes BlueChip, a defensive strategy that has both a design-time component and a runtime component that is able to prevent all hardware attacks the authors evaluate while incurring a small runtime overhead.
Journal ArticleDOI

Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems

TL;DR: A proposed bilevel model is analyzed, which aims at identifying the most damaging and undetectable physical attacks constrained by attackers' total budget, and is solved by a rigorous two-stage solution approach.
Journal ArticleDOI

Cybersecurity in Distributed Power Systems

TL;DR: It is concluded that cybersecurity could play a significant role in managing microgrid operations as microgrids strive for a higher degree of resilience as they supply power services to customers.
References
More filters
Patent

Split manufacturing method for advanced semiconductor circuits

TL;DR: In this article, a back-end-of-line piece of a semiconductor die is manufactured using a second manufacturing line, which will typically be different than the first manufacturing line.
Journal ArticleDOI

Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation

TL;DR: This work proposes a novel application of key-based circuit structure and functionality obfuscation to achieve protection against hardware Trojans triggered by rare internal circuit conditions and shows that the scheme is capable of achieving high levels of security against Trojan attacks at modest area, power and delay overhead.
Proceedings ArticleDOI

VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs

TL;DR: An inverted voltage scheme is proposed for exciting and pronouncing the behavior of any undesirable logic that may be inserted in the IC manufactured abroad, coupled with a sustained vector simulation technique to further enhance the behavioral difference between the genuine and targeted test IC.
Proceedings ArticleDOI

Dynamic evaluation of hardware trust

TL;DR: This work explores an approach to this problem that combines multicore hardware with dynamic distributed software scheduling to determine hardware trust during in-field use at run time and dynamically achieves trust determination by identifying the existence of Trojans with a high level of confidence.
Journal ArticleDOI

Stealthy dopant-level hardware Trojans: extended version

TL;DR: An extremely stealthy approach for implementing hardware Trojans below the gate level is proposed, and their impact on the security of the target device is evaluated and their detectability and their effects on security are evaluated.
Related Papers (5)