Rise of the Hardware Trojans

被引:0
|
作者
Sunar, Berk [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
来源
2011 IEEE 17TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS) | 2011年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time or the Trojan may leak confidential information and secret keys covertly to the adversary. These vulnerabilities have raised serious concerns regarding possible threats to financial infrastructures, transportation security systems, and military systems. Clearly there is a strong motivation to classify and study adversarial hardware design modifications, i.e. hardware Trojan horses. Here we very briefly summarize types of hardware Trojans and refer the reader to relevant works.
引用
收藏
页数:1
相关论文
共 50 条
  • [1] Hardware Trojans in fdSOI
    Lanius, Christian
    Freye, Florian
    Zhang, Shutao
    Gemmeke, Tobias
    2023 IEEE/ACM INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, ISLPED, 2023,
  • [2] On Parametric Hardware Trojans
    Naseem, Raeesa
    PROCEEDINGS OF 2021 INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGIES (IBCAST), 2021, : 714 - 718
  • [3] The rise of targeted trojans
    Sunner, Mark
    Network Security, 2007, 2007 (12) : 4 - 7
  • [4] Testability of cryptographic hardware and detection of Hardware Trojans
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Proceedings of the Asian Test Symposium, 2011, : 517 - 524
  • [5] Testability of Cryptographic Hardware and Detection of Hardware Trojans
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    2011 20TH ASIAN TEST SYMPOSIUM (ATS), 2011, : 517 - 524
  • [6] TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS
    Karri, Ramesh
    Rajendran, Jeyavijayan
    Rosenfeld, Kurt
    Tehranipoor, Mohammad
    COMPUTER, 2010, 43 (10) : 39 - 46
  • [7] Targeted modification of hardware trojans
    Jason R. Hamlet
    Jackson R. Mayo
    Vivian G. Kammler
    Journal of Hardware and Systems Security, 2019, 3 (2) : 189 - 197
  • [8] Hardware Trojans in Reconfigurable Computing
    Ahmed, Qazi Arbab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 182 - 183
  • [9] A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware
    Ito, Akira
    Ueno, Rei
    Homma, Naofumi
    2021 IEEE 51ST INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2021), 2021, : 154 - 159
  • [10] Hardware Trojans and Smart Manufacturing - A Hardware Security Perspective
    Aslam, Sohaib
    Samie, Mohammad
    Jennions, Ian K.
    ADVANCES IN MANUFACTURING TECHNOLOGY XXXII, 2018, 8 : 305 - 310