Hardware Trojans: current challenges and approaches

被引:39
作者
Jacob, Nisha [1 ]
Merli, Dominik [1 ]
Heyszl, Johann [1 ]
Sigl, Georg [1 ]
机构
[1] Fraunhofer AISEC, Hardware Secur, Garching, Germany
关键词
invasive software; integrated circuits; Hardware Trojans; manufacturers outsource parts; cost reduction; intellectual properties; IP; IC development chain; detection techniques; Trojan insertion; Trojan detection techniques;
D O I
10.1049/iet-cdt.2014.0039
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
More and more manufacturers outsource parts of the design and fabrication of integrated circuits (ICs) for cost reduction. Recent publications show that such outsourcing can pose serious threats to governments and corporations, as they lose control of the development process. Until now, the threat of hardware Trojans is mostly considered during fabrication. Third party intellectual properties (IPs) are also gaining importance as companies wish to reduce costs and shorten the time-to-market. Through this study, the authors argue that the threat of Trojans is spread throughout the whole IC development chain. They give a survey of both hardware Trojan insertion possibilities and detection techniques. Furthermore, they identify the key vulnerabilities at each stage of IC development and describe costs of hardware Trojan insertion and detection. This way, the threat level based on feasibility of Trojan insertion and the practicability of Trojan detection techniques is evaluated. Lately, detection techniques address the issue of including third party IP. However, those techniques are not sufficient and need more research to effectively protect the design. In this way, the authors' analysis provides a solid base to identify the issues during IC development, which should be addressed with higher priority by all entities involved in the IC development.
引用
收藏
页码:264 / 273
页数:10
相关论文
共 47 条
  • [1] Acharya A, 2009, INT CONF PERVAS COMP, P11
  • [2] Adam Waksman, 2013, P 2013 ACM SIGSAC C, P697
  • [3] The hunt for the kill switch
    Adee, Sally
    [J]. IEEE SPECTRUM, 2008, 45 (05) : 34 - 39
  • [4] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [5] Alkabani Yousra, 2009, Proceedings of the 2009 IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2009), P123, DOI 10.1145/1687399.1687426
  • [6] [Anonymous], 2006, BAA0640 DARPA
  • [7] [Anonymous], 2013, P 2 INT WORKSH HARDW
  • [8] Appelbaum J.R., 2013, Der Spiegel
  • [9] ARS Technica, 2013, STOP US NSA INFL COD
  • [10] Ball J, 2013, GUARDIAN