2013
DOI: 10.1109/mdt.2012.2196252
|View full text |Cite
|
Sign up to set email alerts
|

Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 113 publications
(63 citation statements)
references
References 11 publications
0
63
0
Order By: Relevance
“…It is also easier to implant hardware Trojans into devices that adopt such lightweight algorithms because these devices are normally used in RFID system and composed of sorts of IPs, and they are typically designed and manufactured by offshore design houses or foundries. In theory, any parties involving into the design or manufacturing stages can make alterations in the circuits for malicious purpose [15], and thus these circuits are more vulnerable to algebraic fault attacks which inject faults by triggering HT.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…It is also easier to implant hardware Trojans into devices that adopt such lightweight algorithms because these devices are normally used in RFID system and composed of sorts of IPs, and they are typically designed and manufactured by offshore design houses or foundries. In theory, any parties involving into the design or manufacturing stages can make alterations in the circuits for malicious purpose [15], and thus these circuits are more vulnerable to algebraic fault attacks which inject faults by triggering HT.…”
Section: Motivationmentioning
confidence: 99%
“…They can be implemented as hardware modifications to ASICs, commercial-off-the-shelf (COTS) parts, microprocessors, microcontrollers, network processors, or digitalsignal processors (DSPs) and can also be implemented as firmware modifications to, for example, FPGA bitstreams [12]. An adversary is expected to make a Trojan stealthy in nature, that is, to evade detection by methods such as postmanufacturing test, optical inspection, or side-channel analysis [13][14][15]. Due to outsourcing trend of the semiconductor design and fabrication, hardware Trojan attacks have emerged as a major security concern for integrated circuits (ICs) [13].…”
Section: Introductionmentioning
confidence: 99%
“…With that challenge in mind, one particularly aspiring solution towards trustworthy chips are hardware monitors or wrappers for the continuous and pervasive control of untrusted and/or security-critical components [129], [130], [139], [148], [149], [150], [151]. The moment such monitors/wrappers observe some malicious behaviour, i.e., any behavioural anomaly with respect to well-defined, "normal" patterns (which may also be re-programmed if need arises), the related components are overridden or isolated.…”
Section: Runtime Attacks and Hardware Monitorsmentioning
confidence: 99%
“…These rogue components will either disable the IC, cause it to behave differently or allow stealing information under specific conditions that will not happen during standard simulations and post-manufacturing tests. This type of attack is termed hardware Trojan [58,[65][66][67][68][69][70][71][72][73].…”
Section: Types Of Attacksmentioning
confidence: 99%
“…A method against timing attack is to make all operations take the same amount of time [45,68], but this is clearly at the cost of efficiency. Another technique with less negative impact on performance and also used against electromagnetic leakage is to blind, i.e.…”
Section: Types Of Attacksmentioning
confidence: 99%