Rise of the Hardware Trojans

被引:0
作者
Sunar, Berk [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
来源
2011 IEEE 17TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS) | 2011年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time or the Trojan may leak confidential information and secret keys covertly to the adversary. These vulnerabilities have raised serious concerns regarding possible threats to financial infrastructures, transportation security systems, and military systems. Clearly there is a strong motivation to classify and study adversarial hardware design modifications, i.e. hardware Trojan horses. Here we very briefly summarize types of hardware Trojans and refer the reader to relevant works.
引用
收藏
页数:1
相关论文
共 50 条
[21]   Stealth Assessment of Hardware Trojans in a Microcontroller [J].
Reece, Trey ;
Limbrick, Daniel B. ;
Wang, Xiaowen ;
Kiddie, Bradley T. ;
Robinson, William H. .
2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, :139-142
[22]   Thermal Scans for Detecting Hardware Trojans [J].
Cozzi, Maxime ;
Galliere, Jean-Marc ;
Maurine, Philippe .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 :117-132
[23]   An Attribute Based Classification of Hardware Trojans [J].
Moein, Samer ;
Khan, Salman ;
Gulliver, T. Aaron ;
Gebali, Fayez ;
El-Kharashi, M. Watheq .
2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, :351-356
[24]   Test Generation for Combinational Hardware Trojans [J].
Wang, Sying-Jyan ;
Wei, Jhih-Yu ;
Huang, Shih-Heng ;
Li, Katherine Shu-Min .
PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,
[25]   Hardware Trojans: current challenges and approaches [J].
Jacob, Nisha ;
Merli, Dominik ;
Heyszl, Johann ;
Sigl, Georg .
IET COMPUTERS AND DIGITAL TECHNIQUES, 2014, 8 (06) :264-273
[26]   Exploiting hardware obfuscation methods to prevent and detect hardware Trojans [J].
Yu, Qiaoyan ;
Dofe, Jaya ;
Zhang, Zhiming .
Midwest Symposium on Circuits and Systems, 2017, 2017-August :819-822
[27]   Hardware Trojans in Wireless Cryptographic ICs [J].
Jin, Yier ;
Makris, Yiorgos .
IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01) :26-35
[28]   Simulation for strategic hardware Trojans testing [J].
2018, Nelson Publishing Inc. (57)
[29]   Hardware Trojans: Threats, Detection, and Prevention [J].
Xiao, Chaoen ;
Chang, Xiangze ;
Wang, Jianxin ;
Zhang, Lei ;
Xu, Hongke ;
Wu, Xinwei ;
Zheng, Yuzheng .
ACM International Conference Proceeding Series, 2023, :529-533
[30]   Can overclocking detect hardware trojans? [J].
Meng, Xingyu ;
Hassan, Rakibul ;
Dinakrrao, Sai Manoj Pudukotai ;
Basu, Kanad .
Proceedings - IEEE International Symposium on Circuits and Systems, 2021, 2021-May