4.7 Article

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Journal

PROCEEDINGS OF THE IEEE
Volume 102, Issue 8, Pages 1229-1247

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JPROC.2014.2334493

Keywords

Hardware intellectual property (IP) trust; hardware obfuscation; hardware Trojan attacks; self-referencing; side-channel analysis; Trojan detection; Trojan taxonomy; Trojan tolerance

Funding

  1. National Science Foundation (NSF) [CNS-1054744, DUE-1245756]
  2. Direct For Computer & Info Scie & Enginr
  3. Division Of Computer and Network Systems [1054744] Funding Source: National Science Foundation
  4. Direct For Education and Human Resources
  5. Division Of Undergraduate Education [1245756] Funding Source: National Science Foundation

Ask authors/readers for more resources

Security of a computer system has been traditionally related to the security of the software or the information being processed. The underlying hardware used for information processing has been considered trusted. The emergence of hardware Trojan attacks violates this root of trust. These attacks, in the form of malicious modifications of electronic hardware at different stages of its life cycle, pose major security concerns in the electronics industry. An adversary can mount such an attack with an objective to cause operational failure or to leak secret information from inside a chip-e.g., the key in a cryptographic chip, during field operation. Global economic trend that encourages increased reliance on untrusted entities in the hardware design and fabrication process is rapidly enhancing the vulnerability to such attacks. In this paper, we analyze the threat of hardware Trojan attacks; present attack models, types, and scenarios; discuss different forms of protection approaches, both proactive and reactive; and describe emerging attack modes, defenses, and future research pathways.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available