2009 IEEE International High Level Design Validation and Test Workshop 2009
DOI: 10.1109/hldvt.2009.5340158
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan: Threats and emerging solutions

Abstract: Malicious modification of hardware during design or fabrication has emerged as a major security concern. Such tampering (also referred to as Hardware Trojan) causes an integrated circuit (IC) to have altered functional behavior, potentially with disastrous consequences in safety-critical applications. Conventional design-time verification and post-manufacturing testing cannot be readily extended to detect hardware Trojans due to their stealthy nature, inordinately large number of possible instances and large v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
150
0
4

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 345 publications
(154 citation statements)
references
References 25 publications
0
150
0
4
Order By: Relevance
“…The affected chip will give desired output in normal condition, but will leak sensitive information upon being triggered. More detailed analysis of hardware Trojans can be found in [16][17][18]. An FPGA-based design is less threatened to hardware Trojans as the entire design cycle can be completed inside the designer's laboratory.…”
Section: Destructive Applications Of Rlutmentioning
confidence: 99%
“…The affected chip will give desired output in normal condition, but will leak sensitive information upon being triggered. More detailed analysis of hardware Trojans can be found in [16][17][18]. An FPGA-based design is less threatened to hardware Trojans as the entire design cycle can be completed inside the designer's laboratory.…”
Section: Destructive Applications Of Rlutmentioning
confidence: 99%
“…Nowadays, detection methods at home and abroad are mainly destructive testing, logic testing and side-channel analysis and the like. Because of its low cost and highly effectual detection side-channel analysis has become more mainstream detection method in the current [3]. For examples, the author used power signal to detect Hardware Trojan in circuit [4], the author used the thermal signal to achieve the Hardware Trojan detection [5], the author detected Hardware Trojan by detecting delay information in circuit [6], etc.…”
Section: Introductionmentioning
confidence: 99%
“…For this reason, more and more research focus on the study of hardware Trojan detection. The most widely used detection methods can be classified into logic testing-based approaches and side-channel analysis-based approaches [4]. Logic testing-based approaches input test vectors to activate the Trojan and recognize its influence.…”
Section: Introductionmentioning
confidence: 99%
“…When threshold set as 10-4, it needs adding 16 dummy flip-flops into s38417 benchmark and 0.8% area overhead [5]. Side-channel analysis-based approaches can detect Trojan by comparing the side-channel parameter of pending test and Trojan-free ICs without triggering Trojan [4]. Side-channel analysis-based approaches has become the most widely used and effective technique [6].…”
Section: Introductionmentioning
confidence: 99%