Ten years of hardware Trojans: a survey from the attacker's perspective

被引:43
作者
Xue, Mingfu [1 ]
Gu, Chongyan [2 ]
Liu, Weiqiang [3 ]
Yu, Shichao [2 ]
O'Neill, Maire [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast, Antrim, North Ireland
[3] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing, Peoples R China
基金
中国国家自然科学基金; 英国工程与自然科学研究理事会;
关键词
invasive software; field programmable gate arrays; industrial property; integrated circuit manufacture; integrated circuit design; integrated circuit testing; circuit CAD; hardware Trojan detection techniques; hardware Trojan design; in-house design team attacks; third-party intellectual property vendor attacks; fabrication stage attacks; distribution stage attacks; hardware Trojan attack scenarios; field-programmable gate array Trojan attacks; computer-aided design tool attacks; hardware Trojan defences; hardware Trojan implementation methods; adversarial model; overhead analysis; copyright owner; integrated circuit industry; SIDE-CHANNEL; THREAT ANALYSIS; SECURITY; MODELS; OBFUSCATION; PREVENT;
D O I
10.1049/iet-cdt.2020.0041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan detection techniques have been studied extensively. However, to develop reliable and effective defenses, it is important to figure out how hardware Trojans are implemented in practical scenarios. The authors attempt to make a review of the hardware Trojan design and implementations in the last decade and also provide an outlook. Unlike all previous surveys that discuss Trojans from the defender's perspective, for the first time, the authors study the Trojans from the attacker's perspective, focusing on the attacker's methods, capabilities, and challenges when the attacker designs and implements a hardware Trojan. First, the authors present adversarial models in terms of the adversary's methods, adversary's capabilities, and adversary's challenges in seven practical hardware Trojan implementation scenarios: in-house design team attacks, third-party intellectual property vendor attacks, computer-aided design tools attacks, fabrication stage attacks, testing stage attacks, distribution stage attacks, and field-programmable gate array Trojan attacks. Second, the authors analyse the hardware Trojan implementation methods under each adversarial model in terms of seven aspects/metrics: hardware Trojan attack scenarios, the attacker's motivation, feasibility, detectability (anti-detection capability), protection and prevention suggestions for the designer, overhead analysis, and case studies of Trojan implementations. Finally, future directions on hardware Trojan attacks and defenses are also discussed.
引用
收藏
页码:231 / 246
页数:16
相关论文
共 129 条
  • [1] The hunt for the kill switch
    Adee, Sally
    [J]. IEEE SPECTRUM, 2008, 45 (05) : 34 - 39
  • [2] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [3] In vitro responses of fish melanophores to lyophilized extracts of Psoralea corylifolia seeds and pure psoralen
    Ali, Sharique A.
    Sultan, T.
    Galgut, Jyoti M.
    Sharma, R.
    Meitei, Keisham V.
    Ali, Ayesha S.
    [J]. PHARMACEUTICAL BIOLOGY, 2011, 49 (04) : 422 - 427
  • [4] [Anonymous], 2008, LEET
  • [5] [Anonymous], 2018, INTEL MANAGEMENT ENG
  • [6] [Anonymous], 2019, TRUST HUB
  • [7] [Anonymous], 2016, INTEL X86S HIDE ANOT
  • [8] [Anonymous], 2017, J. Hardw. Syst. Security, P85, DOI DOI 10.1007/S41635-017-0001-6
  • [9] [Anonymous], 2015, P 58 INT MIDWEST S C
  • [10] [Anonymous], 2019, The Coq Proof Assistant