2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) 2017
DOI: 10.1109/mwscas.2017.8053050
|View full text |Cite
|
Sign up to set email alerts
|

Advancing the state-of-the-art in hardware Trojans design

Abstract: Abstract-Electronic Design Automation (EDA) industry heavily reuses third party IP cores. These IP cores are vulnerable to insertion of Hardware Trojans (HTs) at design time by third party IP core providers or by malicious insiders in the design team. State of the art research has shown that existing HT detection techniques, which claim to detect all publicly available HT benchmarks, can still be defeated by carefully designing new sophisticated HTs. The reason being that these techniques consider the HT lands… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…Fig. 1b depicts the Trojan model proposed in [8]. The stealthiness of trigger circuit is implemented by a combination of rare switching signals, such as C m ¼ C m1 C m2 ; Á Á Á ; C mk .…”
Section: Proposed Trojan Design Schemesmentioning
confidence: 99%
See 3 more Smart Citations
“…Fig. 1b depicts the Trojan model proposed in [8]. The stealthiness of trigger circuit is implemented by a combination of rare switching signals, such as C m ¼ C m1 C m2 ; Á Á Á ; C mk .…”
Section: Proposed Trojan Design Schemesmentioning
confidence: 99%
“…3. Resistance to the state-of-the-art detections 3.1 Activation probability Activation probability is a basic evaluation criterion for Trojan stealthiness analysis in activation based detections, [7,9]; b. XOR-LFSR structure in [8] a b c d The difference between trigger activation and Trojan activation lies in the dependency between trigger and payload signals. For simplicity, we suppose that trigger signal and payload signal are independent and Trojan circuit will make some difference to the original circuit when trigger condition is satisfied.…”
Section: Deny Of Service Trojansmentioning
confidence: 99%
See 2 more Smart Citations
“…DoS attack enabled by hardware Trojan (HT) is becoming a serious threat to modern many-core chips [3], [13]. Various circuit level HT detection techniques have been proposed, based on logic testing and side channel analysis during the post-silicon test/validation process [1], [14].…”
Section: B Dos Attackmentioning
confidence: 99%