A Survey of Hardware Trojan Taxonomy and Detection

被引:815
作者
Tehranipoor, Mohammad [1 ]
Koushanfar, Farinaz [2 ]
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Unit 2157, Storrs, CT 06269 USA
[2] Rice Univ, Houston, TX 77251 USA
来源
IEEE DESIGN & TEST OF COMPUTERS | 2010年 / 27卷 / 01期
基金
美国国家科学基金会;
关键词
D O I
10.1109/MDT.2010.7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Editor's note: Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection. -Krish Chakrabarty, Editor in Chief. © 2010 IEEE.
引用
收藏
页码:10 / 25
页数:16
相关论文
共 34 条
[1]   The hunt for the kill switch [J].
Adee, Sally .
IEEE SPECTRUM, 2008, 45 (05) :34-39
[2]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[3]  
Alkabani Y., 2009, P IEEE ACM INT C COM
[4]  
Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
[5]  
[Anonymous], P IEEE ACM INT C COM
[6]  
[Anonymous], 2003, INTELLECTUAL PROPERT
[7]  
[Anonymous], P IEEE INT WORKSH HA
[8]  
[Anonymous], INN RISK INT PROP CH
[9]  
[Anonymous], P INT WORKSH HARDW O
[10]  
[Anonymous], 2009, P 5 ANN WORKSH CYB S