2021
DOI: 10.1016/j.vlsi.2021.03.002
|View full text |Cite
|
Sign up to set email alerts
|

On malicious implants in PCBs throughout the supply chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 36 publications
0
15
0
Order By: Relevance
“…Trojan circuits create a backdoor for attackers and can be utilized to launch attacks compromising security assurance. Known practical PCB Trojans [26], [36], [64] fall into two main categories: Triggerable Trojans (Sec.V-A1 and V-A2). At the board level, Triggerable Trojans are based on small-package chips.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Trojan circuits create a backdoor for attackers and can be utilized to launch attacks compromising security assurance. Known practical PCB Trojans [26], [36], [64] fall into two main categories: Triggerable Trojans (Sec.V-A1 and V-A2). At the board level, Triggerable Trojans are based on small-package chips.…”
Section: Threat Modelmentioning
confidence: 99%
“…Accounting for every potential point-of-failure or susceptibility is impractical. Efforts have been made in academia to classify state-of-the-art threats and defenses [26], [53]. Still, the work is perennially ongoing and largely unsystematic because of different attack vectors that prevent generalization.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, as an emerging trend, both the chip and printed circuit board (PCB) supply chains have become globalized in terms of, e.g., design, manufacturing, and distribution [20]. Chip or PCB designers devise and produce merely a small portion of components in-house, while relying on a variety of possibly malicious third-party components, contract manufactures, distributors, and EDA tools, thus rendering the supply chains vulnerable to hardware attacks from external entities.…”
Section: Hardware Supply-chain Attacksmentioning
confidence: 99%
“…In 2021, Harrison et. al surveyed existing PCB countermeasures and examples of board-level Trojans [6] and developed a taxonomy for establishing benchmarks for security.…”
Section: A Current Pcb Obfuscation Techniquesmentioning
confidence: 99%