Hardware Trojan Attacks: Threat Analysis and Countermeasures

被引:491
作者
Bhunia, Swarup [1 ]
Hsiao, Michael S. [2 ]
Banga, Mainak [3 ]
Narasimhan, Seetharam [4 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
[2] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
[3] Intel Corp, Folsom, CA 95630 USA
[4] Intel Corp, Hillsboro, OR 97124 USA
基金
美国国家科学基金会;
关键词
Hardware intellectual property (IP) trust; hardware obfuscation; hardware Trojan attacks; self-referencing; side-channel analysis; Trojan detection; Trojan taxonomy; Trojan tolerance; SECURITY; TAXONOMY;
D O I
10.1109/JPROC.2014.2334493
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security of a computer system has been traditionally related to the security of the software or the information being processed. The underlying hardware used for information processing has been considered trusted. The emergence of hardware Trojan attacks violates this root of trust. These attacks, in the form of malicious modifications of electronic hardware at different stages of its life cycle, pose major security concerns in the electronics industry. An adversary can mount such an attack with an objective to cause operational failure or to leak secret information from inside a chip-e.g., the key in a cryptographic chip, during field operation. Global economic trend that encourages increased reliance on untrusted entities in the hardware design and fabrication process is rapidly enhancing the vulnerability to such attacks. In this paper, we analyze the threat of hardware Trojan attacks; present attack models, types, and scenarios; discuss different forms of protection approaches, both proactive and reactive; and describe emerging attack modes, defenses, and future research pathways.
引用
收藏
页码:1229 / 1247
页数:19
相关论文
共 75 条
[1]   Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad IDDQs [J].
Aarestad, Jim ;
Acharyya, Dhruva ;
Rad, Reza ;
Plusquellic, Jim .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :893-904
[2]   Examining the Link Between Issue Attitudes and News Source: The Case of Latinos and Immigration Reform [J].
Abrajano, Marisa ;
Singh, Simran .
POLITICAL BEHAVIOR, 2009, 31 (01) :1-30
[3]   Calibrating power supply signal measurements for process and probe card variations [J].
Acharyya, D ;
Plusquellic, J .
DBT 2004: PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL WORKSHOP ON CURRENT & DEFECT BASED TESTING, 2004, :23-30
[4]  
Adam Waksman, 2013, P 2013 ACM SIGSAC C, P697
[5]   The hunt for the kill switch [J].
Adee, Sally .
IEEE SPECTRUM, 2008, 45 (05) :34-39
[6]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[7]  
Ali S., 2011, P DES AUT TEST EUR C, DOI [10.1109/DATE.2011.5763307, DOI 10.1109/DATE.2011.5763307]
[8]  
Alkabani Yousra, 2009, Proceedings of the 2009 IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2009), P123, DOI 10.1145/1687399.1687426
[9]  
[Anonymous], 2007, TRUST INT CIRC TIC
[10]  
[Anonymous], PROTECTING INTEGRATE