2013
DOI: 10.1109/mdt.2009.159
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Hardware Trojan Taxonomy and Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
219
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 147 publications
(220 citation statements)
references
References 23 publications
0
219
0
1
Order By: Relevance
“…1 The incentive that drives the entire hardware Trojan field is the gain, G, that the adversary seeks as a result of inserting the Trojan. The related value for the defender is the loss, L, which they will suffer if the Trojan is successful.…”
Section: A Variables In the Security Economic Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…1 The incentive that drives the entire hardware Trojan field is the gain, G, that the adversary seeks as a result of inserting the Trojan. The related value for the defender is the loss, L, which they will suffer if the Trojan is successful.…”
Section: A Variables In the Security Economic Modelmentioning
confidence: 99%
“…On the other hand, even for the adversary, their creativity is not entirely unbounded, and the Trojans available to them may be classified into discrete kinds. Attempts to establish categories of strategies available to the opponents have resulted in a variety of Trojan and Trojan defense method taxonomies, such as those in [1]. The question of optimal taxonomies to use with our formulation is left for future work.…”
Section: A Variables In the Security Economic Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The goal of IC reverse engineering is to uncover the functionality and internal structure (e.g., gate netlist, circuit schematic, layout, manufacturing process details) of the chip via techniques such as depackaging/delayering, high-resolution imaging, probing, and side-channel examination. With this knowledge, an attacker can more efficiently mount various attacks (e.g., fault injection, sidechannel), clone/counterfeit the design possibly with hardware Trojans inserted, and discover trade secrets (e.g., proprietary algorithms, hard-coded keys and instruction sequences) [1]- [5]. A number of commercial entities such as ChipWorks [6] and TAEUS [7] offer IC reverse engineering services and routinely reverse engineer chips on even the most advanced process technologies.…”
Section: Introductionmentioning
confidence: 99%
“…Given the wide reach of technology in every aspect of our everyday life, the impact of such hardware Trojans can be disastrous. Accordingly, intense research efforts have been invested in preventing and/or detecting hardware Trojan inclusion in various phases of IC design and fabrication [1,2].…”
Section: Introductionmentioning
confidence: 99%