2018
DOI: 10.1007/978-3-319-89641-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Thermal Scans for Detecting Hardware Trojans

Abstract: It is well known that companies have been outsourcing their IC production to countries where it is simply not possible to guarantee the integrity of final products. This relocation trend creates a need for methodologies and embedded design solutions to identify counterfeits but also to detect potential Hardware Trojans (HT). Hardware Trojans are tiny pieces of hardware that can be maliciously inserted in designs for several purposes ranging from denial of service, programmed obsolescence etc. They are usually … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Columns two, four, and six of the table show that the consumer flow, in this case, would be irrelevant/not applicable. It can also be observed from Table 3.4 that the Trojan can be detected by any of the parties in a short amount of time which might be fast in comparison to the side-channel analysis technique based on the EM [97] and thermal scans [87] where the additional time is required to collect and process the EM and thermal signals.…”
Section: Hardware Trojans In Fpgasmentioning
confidence: 99%
“…Columns two, four, and six of the table show that the consumer flow, in this case, would be irrelevant/not applicable. It can also be observed from Table 3.4 that the Trojan can be detected by any of the parties in a short amount of time which might be fast in comparison to the side-channel analysis technique based on the EM [97] and thermal scans [87] where the additional time is required to collect and process the EM and thermal signals.…”
Section: Hardware Trojans In Fpgasmentioning
confidence: 99%
“…In some cases, the attacker can have access to the cryptoprocessor hardware outside of the secure boot context. If so, lock-in thermography [5] of the SoC can help at identifying areas of interest precisely [10]. 1 Lock-in thermography is based on thermal analysis of the die using infrared (IR) measurements.…”
Section: Lock-in Thermographymentioning
confidence: 99%
“…Usually a HT is quietly hidden in its host circuit and can only be triggered in rare conditions [5]. To detect the silent HTs, currently there are three categories of method: logic testing [6]- [10], side-channel analysis [11]- [16] and feature analysis [17]- [22]. Logic testing approaches [6]- [10] attempt to generate a large number of test vectors to activate unknown HTs and propagate their effects to the output ports.…”
Section: Introductionmentioning
confidence: 99%