2014
DOI: 10.1049/iet-cdt.2014.0039
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojans: current challenges and approaches

Abstract: More and more manufacturers outsource parts of the design and fabrication of integrated circuits (ICs) for cost reduction. Recent publications show that such outsourcing can pose serious threats to governments and corporations, as they lose control of the development process. Until now, the threat of hardware Trojans is mostly considered during fabrication. Third party intellectual properties (IPs) are also gaining importance as companies wish to reduce costs and shorten the timeto-market. Through this study, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(18 citation statements)
references
References 34 publications
0
18
0
Order By: Relevance
“…Besides, HTs inserted in unreliable foundries were the first threat to be studied extensively; it was more recently considered that the threat might as well come from the design phase where a HT can be introduced by a rogue designer or through an IP from third party providers [5,[79][80][81][82].…”
Section: Discussionmentioning
confidence: 99%
“…Besides, HTs inserted in unreliable foundries were the first threat to be studied extensively; it was more recently considered that the threat might as well come from the design phase where a HT can be introduced by a rogue designer or through an IP from third party providers [5,[79][80][81][82].…”
Section: Discussionmentioning
confidence: 99%
“…These are also designed to disclose the transaction secret information, Denial-of-Service, and alter the system functionality. Attackers can insert HTs at any level from the high-level system design specification to the transistor level of IC design flow [11]. A typical structure of HTs that could be inserted into Blockchain is shown in Figure 4.…”
Section: Hardware Trojansmentioning
confidence: 99%
“…The detection difficulty is highest at this stage because of prohibitive time and cost requirements ( Jacob et al, 2014 ). Current detection techniques mostly focus on post-fabrication stages and use a golden chip as a reference model.…”
Section: Detecting Hardware Trojans In Ic Chipsmentioning
confidence: 99%
“…The detection difficulty at the gate-level is medium ( Jacob et al, 2014 ) because the netlist is used to produce IC chips. Compared with chips, gate-level netlists provide more design information.…”
Section: Detecting Hardware Trojans In Gate-level Netlistsmentioning
confidence: 99%