2020
DOI: 10.1049/iet-cdt.2020.0041
|View full text |Cite
|
Sign up to set email alerts
|

Ten years of hardware Trojans: a survey from the attacker's perspective

Abstract: In the last decade, hardware Trojan has emerged as a serious concern in integrated circuit (IC) industry. As such, hardware Trojan detection techniques have been studied extensively. However, in order to develop reliable and effective defenses, it is important to figure out how hardware Trojans are implemented in practical scenarios. In this paper, we attempt to make a review of the hardware Trojan design and implementations in the last decade and also provide an outlook. Unlike all previous surveys that discu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 54 publications
(23 citation statements)
references
References 121 publications
(250 reference statements)
0
23
0
Order By: Relevance
“…Therefore, in this paper, we propose a Net2Vec methodology, in which a word embedding algorithm is utilized to encode PCP feature traces. The PCP vocabulary (w) can be assembled according to Equation (2). An example of the rewritten PCP feature traces using PCP words is shown in Fig.…”
Section: Nlp-based Encoding For Extracted Information (Net2vec)mentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, in this paper, we propose a Net2Vec methodology, in which a word embedding algorithm is utilized to encode PCP feature traces. The PCP vocabulary (w) can be assembled according to Equation (2). An example of the rewritten PCP feature traces using PCP words is shown in Fig.…”
Section: Nlp-based Encoding For Extracted Information (Net2vec)mentioning
confidence: 99%
“…It is easier to insert functional Trojans at a design stage because there are more opportunities for third-party entities to accomplish Trojan insertion. Moreover, the logic of functional Trojans can be cleverly designed in size and activated stealthily to achieve its malicious purpose, which is challenging for detection approaches using traditional IC tests and verification solutions [1], [2].…”
Section: Introductionmentioning
confidence: 99%
“…An adversary can insert a hardware Trojan at any IC supply chain phase [34]. In-house rogue designers are capable of inserting Trojan at the design phase.…”
Section: A Trojan Insertion In the Supply Chainmentioning
confidence: 99%
“…Attacker in a 3PIP vendor can insert stealthy HTs into the IP at RTL and/or netlist level or other design specification levels. Using the unauthenticated HT-inserted 3PIP in the original design compromises design integrity [34]. A design faces maximum trust issue when it is sent to a third-party facility for fabrication.…”
Section: A Trojan Insertion In the Supply Chainmentioning
confidence: 99%
See 1 more Smart Citation