Proceedings ArticleDOI
Hardware Trojan: Threats and emerging solutions
Rajat Subhra Chakraborty,Seetharam Narasimhan,Swarup Bhunia +2 more
- pp 166-171
TLDR
The threat posed by hardware Trojans and the methods of deterring them are analyzed, a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques are presented.Abstract:
Malicious modification of hardware during design or fabrication has emerged as a major security concern. Such tampering (also referred to as Hardware Trojan) causes an integrated circuit (IC) to have altered functional behavior, potentially with disastrous consequences in safety-critical applications. Conventional design-time verification and post-manufacturing testing cannot be readily extended to detect hardware Trojans due to their stealthy nature, inordinately large number of possible instances and large variety in structure and operating mode. In this paper, we analyze the threat posed by hardware Trojans and the methods of deterring them. We present a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques. Next, we discuss the major challenges associated with this security concern and future research needs to address them.read more
Citations
More filters
Journal ArticleDOI
Hardware Trojan Attacks: Threat Analysis and Countermeasures
TL;DR: The threat of hardware Trojan attacks is analyzed; attack models, types, and scenarios are presented; different forms of protection approaches are discussed; and emerging attack modes, defenses, and future research pathways are described.
Journal ArticleDOI
A survey of emerging threats in cybersecurity
Julian Jang-Jaccard,Surya Nepal +1 more
TL;DR: An overview of the most exploited vulnerabilities in existing hardware, software, and network layers is presented and critiques of existing state-of-the-art mitigation techniques as why they do or don't work are described.
Journal ArticleDOI
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
Seetharam Narasimhan,Dongdong Du,Rajat Subhra Chakraborty,Somnath Paul,Francis Wolff,Christos A. Papachristou,Kaushik Roy,Swarup Bhunia +7 more
TL;DR: A novel noninvasive, multiple-parameter side-channel analysisbased Trojan detection approach that uses the intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a Trojan circuit from process noise.
Proceedings Article
Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation
TL;DR: This work provides a precise notion of security, that is called k-security, and a characterization of the underlying computational problems and their complexity, and proposes a concrete approach for identifying sets of wires to be lifted, and the corresponding security they provide.
Journal ArticleDOI
Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
Swarup Bhunia,Miron Abramovici,Dakshi Agrawal,Paul Bradley,Michael S. Hsiao,Jim Plusquellic,Mohammad Tehranipoor +6 more
TL;DR: An overview of hardware Trojans and countermeasures is provided that act as spies or terrorists in the microelectronic industry.
References
More filters
Proceedings ArticleDOI
Trojan Detection using IC Fingerprinting
TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Proceedings ArticleDOI
Hardware Trojan detection using path delay fingerprint
Yier Jin,Yiorgos Makris +1 more
TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Book ChapterDOI
MERO: A Statistical Approach for Hardware Trojan Detection
TL;DR: A test pattern generation technique based on multiple excitation of rare logic conditions at internal nodes that maximizes the probability of inserted Trojans getting triggered and detected by logic testing, while drastically reducing the number of vectors compared to a weighted random pattern based test generation.
Journal ArticleDOI
The Hunt For The Kill Switch
TL;DR: The Trust in Integrated Circuits (TIIC) program as discussed by the authors is a three-year initiative to verify the integrity of the military's integrated circuits, including the F-35.
Proceedings ArticleDOI
Detecting malicious inclusions in secure hardware: Challenges and solutions
TL;DR: The wide range of malicious alternations of ICs that are possible are explored and a general framework for their classification is proposed and the taxonomy is essential for properly evaluating the effectiveness of methods designed to detect Trojans.