Ten years of hardware Trojans: a survey from the attacker's perspective

被引:43
作者
Xue, Mingfu [1 ]
Gu, Chongyan [2 ]
Liu, Weiqiang [3 ]
Yu, Shichao [2 ]
O'Neill, Maire [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast, Antrim, North Ireland
[3] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing, Peoples R China
基金
中国国家自然科学基金; 英国工程与自然科学研究理事会;
关键词
invasive software; field programmable gate arrays; industrial property; integrated circuit manufacture; integrated circuit design; integrated circuit testing; circuit CAD; hardware Trojan detection techniques; hardware Trojan design; in-house design team attacks; third-party intellectual property vendor attacks; fabrication stage attacks; distribution stage attacks; hardware Trojan attack scenarios; field-programmable gate array Trojan attacks; computer-aided design tool attacks; hardware Trojan defences; hardware Trojan implementation methods; adversarial model; overhead analysis; copyright owner; integrated circuit industry; SIDE-CHANNEL; THREAT ANALYSIS; SECURITY; MODELS; OBFUSCATION; PREVENT;
D O I
10.1049/iet-cdt.2020.0041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan detection techniques have been studied extensively. However, to develop reliable and effective defenses, it is important to figure out how hardware Trojans are implemented in practical scenarios. The authors attempt to make a review of the hardware Trojan design and implementations in the last decade and also provide an outlook. Unlike all previous surveys that discuss Trojans from the defender's perspective, for the first time, the authors study the Trojans from the attacker's perspective, focusing on the attacker's methods, capabilities, and challenges when the attacker designs and implements a hardware Trojan. First, the authors present adversarial models in terms of the adversary's methods, adversary's capabilities, and adversary's challenges in seven practical hardware Trojan implementation scenarios: in-house design team attacks, third-party intellectual property vendor attacks, computer-aided design tools attacks, fabrication stage attacks, testing stage attacks, distribution stage attacks, and field-programmable gate array Trojan attacks. Second, the authors analyse the hardware Trojan implementation methods under each adversarial model in terms of seven aspects/metrics: hardware Trojan attack scenarios, the attacker's motivation, feasibility, detectability (anti-detection capability), protection and prevention suggestions for the designer, overhead analysis, and case studies of Trojan implementations. Finally, future directions on hardware Trojan attacks and defenses are also discussed.
引用
收藏
页码:231 / 246
页数:16
相关论文
共 129 条
  • [11] Banga Mainak, 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P56, DOI 10.1109/HST.2010.5513114
  • [12] Bao A, 2014, ELEC COMP C, P47, DOI 10.1109/ECTC.2014.6897265
  • [13] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57
  • [14] CAD-Base: An Attack Vector into the Electronics Supply Chain
    Basu, Kanad
    Saeed, Samah Mohamed
    Pilato, Christian
    Ashraf, Mohammed
    Nabeel, Mohammed Thari
    Chakrabarty, Krishnendu
    Karri, Ramesh
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2019, 24 (04)
  • [15] A case study in hardware Trojan design and implementation
    Baumgarten, Alex
    Steffen, Michael
    Clausman, Matthew
    Zambreno, Joseph
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 1 - 14
  • [16] Becker Georg T., 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P30, DOI 10.1109/HST.2010.5513117
  • [17] Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
  • [18] Becker GT., 2017, Foundations of Hardware IP Protection, P105
  • [19] Hardware Trojan Horses in Cryptographic IP Cores
    Bhasin, Shivam
    Danger, Jean-Luc
    Guilley, Sylvain
    Xuan Thuy Ngo
    Sauvage, Laurent
    [J]. 2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 15 - 29
  • [20] Bhunia S., 2017, HARDWARE TROJAN WAR