Trustworthy Hardware: Identifying and Classifying Hardware Trojans
Citations
588 citations
Cites background from "Trustworthy Hardware: Identifying a..."
...The area and power overhead relative to the design in which the Trojan is inserted has to be an undetectable fraction, in order to evade detection by obvious means [29]....
[...]
523 citations
514 citations
Cites background from "Trustworthy Hardware: Identifying a..."
...Microcontrollers are extensively used in embedded systems, and they are equipped with ‘‘fuse bits’’ to prevent unauthorized users from reading or modifying selected sections of its memory....
[...]
...The left column shows the goals of the attack, and the right column shows the location of the attacker within the IC supply chain....
[...]
...An increase in the number and destructive power of hardware-based attacks has highlighted the need for securing the hardware root of trust side by side of power, cost, performance, and reliability optimizations....
[...]
489 citations
Cites background from "Trustworthy Hardware: Identifying a..."
...EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. vVe demonstrate that an attacker can decipher the obfuscated net.list, in a time linear to the number of keys, by sensitizing the key values to the output....
[...]
373 citations
Cites background from "Trustworthy Hardware: Identifying a..."
...These malicious agents can pirate the IP, overbuild ICs for illegal sale, tamper the ICs to insert malicious circuitry in the form of Hardware Trojans (HTs), or reverse engineer the netlist from an IC for unlicensed use [2]....
[...]
References
1,227 citations
1,133 citations
766 citations
611 citations
392 citations