2016
DOI: 10.1145/2906147
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojans

Abstract: Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially for those integrated circuits (ICs) and systems used in critical applications and cyber infrastructure. While hardware Trojans have been explored significantly in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
79
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 347 publications
(79 citation statements)
references
References 78 publications
0
79
0
Order By: Relevance
“…Apart from IP protection, the possibility for HT insertion by an untrustworthy foundry also raises concerns, especially for military applications. ICs that are "bugged" with HTs may (i) deviate from their specified functionality, (ii) leak sensitive information, and/or (iii) become unreliable or fail at particular points in time [3]. Trojans can be broadly classified into digital Trojans and physical Trojans, depending on their payload and trigger mechanisms.…”
Section: Hardware Trojansmentioning
confidence: 99%
See 1 more Smart Citation
“…Apart from IP protection, the possibility for HT insertion by an untrustworthy foundry also raises concerns, especially for military applications. ICs that are "bugged" with HTs may (i) deviate from their specified functionality, (ii) leak sensitive information, and/or (iii) become unreliable or fail at particular points in time [3]. Trojans can be broadly classified into digital Trojans and physical Trojans, depending on their payload and trigger mechanisms.…”
Section: Hardware Trojansmentioning
confidence: 99%
“…On the other hand, there are powerful attacks such as Meltdown [2], which skillfully exploit these very practices to extract sensitive data at runtime. Besides, malicious foundries may implement so-called hardware Trojans (HTs) which can help an adversary to extract sensitive data purposefully [3]. Apart from such concerns regarding the security and trustworthiness of hardware at runtime, protecting the hardware itself from threats such as piracy of design intellectual property (IP) or illegal overproduction is another challenge.…”
Section: Introductionmentioning
confidence: 99%
“…Components can be rendered unintentionally faulty/prone, via design or implementation bugs (e.g., Rowhammer [144]), but they can also be made intentionally and inherently faulty/prone (e.g., via hardware Trojans [145], see Section 5.4).…”
Section: Verification Of Outsourced Componentsmentioning
confidence: 99%
“…Hardware Trojans are another major concern for reliable and trustworthy chips; they are hardware modifications inserted by an untrustworthy third party in order to alter the chip's functionality, leak critical information, or degrade the chip's reliability and/or performance [145]. The detection of hardware Trojans, both at design and runtime, has recently gained more interest, and promising techniques have been proposed [116], [117], [118], [119], [145], [148], [152], [153].…”
Section: Detection Of Hardware Trojansmentioning
confidence: 99%
See 1 more Smart Citation