2010
DOI: 10.1109/mdt.2010.7
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Hardware Trojan Taxonomy and Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
283
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 1,065 publications
(285 citation statements)
references
References 24 publications
0
283
0
2
Order By: Relevance
“…A different perspective is to use these side-channel measurements to determine if malware has been inserted into a circuit, either in hardware or software. Numerous side-channel techniques have been proposed [31][32][33][34][35] to detect the presence of malicious hardware in commercial ICs. In [36], the authors demonstrated the ability to determine the class of instructions, based on hardware usage, from power supply side-channel measurements.…”
Section: Ic-level Detectionmentioning
confidence: 99%
“…A different perspective is to use these side-channel measurements to determine if malware has been inserted into a circuit, either in hardware or software. Numerous side-channel techniques have been proposed [31][32][33][34][35] to detect the presence of malicious hardware in commercial ICs. In [36], the authors demonstrated the ability to determine the class of instructions, based on hardware usage, from power supply side-channel measurements.…”
Section: Ic-level Detectionmentioning
confidence: 99%
“…Numerous important aspects have been addressed, such as key management schemes in mobile ad hoc networks [12] and distributed sensor networks [16], secure routing protocols [7] and localization algorithms [26] to prevent wireless sensor attacks, and privacy protection in RFID systems [34]. However, none of these important contributions address the detection of hardware Trojans (HTs) [22] [40]. HTs are in a sense the most powerful way to complete compromise the security any wireless or other devices because they enable the attacker to bypass all application and system software defense mechanisms, to access any storage element, change access rights of any program, and abuse (e.g., induce high energy consumption) or destroy any piece of hardware.…”
Section: Motivationmentioning
confidence: 99%
“…With only a few lines of modification in Hardware Description Languages (HDLs), one can introduce malicious behavior that can undermine the correct operation of the entire system. Such design-time injections are also especially difficult to detect due to possible obfuscation [13] and small physical footprints [15]. Since they may be activated under very specific conditions, they are unlikely to be triggered and detected in simulation or functional tests.…”
Section: Introductionmentioning
confidence: 99%