2014
DOI: 10.1109/jproc.2014.2334493
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
281
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 598 publications
(284 citation statements)
references
References 52 publications
1
281
0
2
Order By: Relevance
“…Hardware trojans implanted in chips during various stage [137,138] of its supply chain can lead to information leakage [139], operational failure [137] leading to denial of service, and breach in the integrity of the data [140]. IoT, Smart Sensors, and CPS in general have various resource constraint which makes the task of securing the hardware challenging [141].…”
Section: Hardware Security and Manufacturing Supply Chainmentioning
confidence: 99%
“…Hardware trojans implanted in chips during various stage [137,138] of its supply chain can lead to information leakage [139], operational failure [137] leading to denial of service, and breach in the integrity of the data [140]. IoT, Smart Sensors, and CPS in general have various resource constraint which makes the task of securing the hardware challenging [141].…”
Section: Hardware Security and Manufacturing Supply Chainmentioning
confidence: 99%
“…A different perspective is to use these side-channel measurements to determine if malware has been inserted into a circuit, either in hardware or software. Numerous side-channel techniques have been proposed [31][32][33][34][35] to detect the presence of malicious hardware in commercial ICs. In [36], the authors demonstrated the ability to determine the class of instructions, based on hardware usage, from power supply side-channel measurements.…”
Section: Ic-level Detectionmentioning
confidence: 99%
“…The HT taxonomies can be used for this purpose. Bhunia et al [9] presents a taxonomy of HTs based on an extensive survey of the existing literature. The trigger based HTs are subdivided into digital and analog categories where digital HTs have two general models, combinational and sequential HTs.…”
Section: Introductionmentioning
confidence: 99%