• DocumentCode
    10150
  • Title

    Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution

  • Author

    Bhunia, Swarup ; Abramovici, Miron ; Agrawal, Dakshi ; Bradley, Paul ; Hsiao, Michael S. ; Plusquellic, Jim ; Tehranipoor, Mohammad

  • Author_Institution
    Case Western Reserve Univ., Cleaveland, OH, USA
  • Volume
    30
  • Issue
    3
  • fYear
    2013
  • fDate
    Jun-13
  • Firstpage
    6
  • Lastpage
    17
  • Abstract
    With the increasing disintegration of the design and manufacturing chain of our microelectronic products, we should not only worry about including unintentional, unwanted hardware features (“bugs”), but also about including intentional malicious hardware features: “Trojan Horses,”which act as spies or terrorists. This article provides an overview of hardware Trojans and countermeasures.
  • Keywords
    integrated circuit manufacture; integrated circuit reliability; invasive software; Trojan Horses; hardware Trojan attacks; intentional malicious hardware features; microelectronic products; Computer security; Hardware; Integrated circuits; Intellectual property; Logic testing; Switching circuits; Trojan horses; Hardware Trojan; hardware security;
  • fLanguage
    English
  • Journal_Title
    Design & Test, IEEE
  • Publisher
    ieee
  • ISSN
    2168-2356
  • Type

    jour

  • DOI
    10.1109/MDT.2012.2196252
  • Filename
    6189843