scispace - formally typeset
Proceedings ArticleDOI

Hardware Trojan: Threats and emerging solutions

TLDR
The threat posed by hardware Trojans and the methods of deterring them are analyzed, a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques are presented.
Abstract
Malicious modification of hardware during design or fabrication has emerged as a major security concern. Such tampering (also referred to as Hardware Trojan) causes an integrated circuit (IC) to have altered functional behavior, potentially with disastrous consequences in safety-critical applications. Conventional design-time verification and post-manufacturing testing cannot be readily extended to detect hardware Trojans due to their stealthy nature, inordinately large number of possible instances and large variety in structure and operating mode. In this paper, we analyze the threat posed by hardware Trojans and the methods of deterring them. We present a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques. Next, we discuss the major challenges associated with this security concern and future research needs to address them.

read more

Citations
More filters
Journal ArticleDOI

Hardware Trojan Attacks: Threat Analysis and Countermeasures

TL;DR: The threat of hardware Trojan attacks is analyzed; attack models, types, and scenarios are presented; different forms of protection approaches are discussed; and emerging attack modes, defenses, and future research pathways are described.
Journal ArticleDOI

A survey of emerging threats in cybersecurity

TL;DR: An overview of the most exploited vulnerabilities in existing hardware, software, and network layers is presented and critiques of existing state-of-the-art mitigation techniques as why they do or don't work are described.
Journal ArticleDOI

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

TL;DR: A novel noninvasive, multiple-parameter side-channel analysisbased Trojan detection approach that uses the intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a Trojan circuit from process noise.
Proceedings Article

Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation

TL;DR: This work provides a precise notion of security, that is called k-security, and a characterization of the underlying computational problems and their complexity, and proposes a concrete approach for identifying sets of wires to be lifted, and the corresponding security they provide.
References
More filters
Proceedings ArticleDOI

Trojan Detection using IC Fingerprinting

TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Proceedings ArticleDOI

Hardware Trojan detection using path delay fingerprint

TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Book ChapterDOI

MERO: A Statistical Approach for Hardware Trojan Detection

TL;DR: A test pattern generation technique based on multiple excitation of rare logic conditions at internal nodes that maximizes the probability of inserted Trojans getting triggered and detected by logic testing, while drastically reducing the number of vectors compared to a weighted random pattern based test generation.
Journal ArticleDOI

The Hunt For The Kill Switch

TL;DR: The Trust in Integrated Circuits (TIIC) program as discussed by the authors is a three-year initiative to verify the integrity of the military's integrated circuits, including the F-35.
Proceedings ArticleDOI

Detecting malicious inclusions in secure hardware: Challenges and solutions

TL;DR: The wide range of malicious alternations of ICs that are possible are explored and a general framework for their classification is proposed and the taxonomy is essential for properly evaluating the effectiveness of methods designed to detect Trojans.
Related Papers (5)