Designer's hardware Trojan horse

被引:18
作者
Alkabani, Yousra [1 ]
Koushanfar, Farinaz [1 ]
机构
[1] Rice Univ, CS Dept, Houston, TX 77251 USA
来源
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST | 2008年
关键词
D O I
10.1109/HST.2008.4559059
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the first approach for pre-synthesis embedding of hardware Trojan horses (HTHs) by the designer. The embedded HTH gives the designer a low layer control over the hardware that can be exploited post-manufacturing. We identify the essential components for the exploit, outline the pre-synthesis implementation, and discuss detection. The new HTH embedding approach is low-overhead, effective, and hard to detect/remove. We emphasize that the diagnosis and isolation of designer's HTHs is a standing research challenge.
引用
收藏
页码:82 / 83
页数:2
相关论文
共 13 条
[1]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[2]  
ALKABANI Y, 2007, ICCAD
[3]  
ALKABANI Y, 2008, DAC
[4]  
Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
[5]  
CABUK S, 2004, ACM C COMP COMM SEC, P178
[6]  
*DSB, DSB STUD HIGH PERF M
[7]  
Hennessy J. L, 2012, COMPUTER ARCHITECTUR
[8]  
KEIZER G, MAXTOR DRIVES CONTAI
[9]  
King Samuel T., 2008, 1 USENIX WORKSH LARG
[10]   Techniques for the creation of digital watermarks in sequential circuit designs [J].
Oliveira, AL .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2001, 20 (09) :1101-1117