DocumentCode :
10150
Title :
Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
Author :
Bhunia, Swarup ; Abramovici, Miron ; Agrawal, Dakshi ; Bradley, Paul ; Hsiao, Michael S. ; Plusquellic, Jim ; Tehranipoor, Mohammad
Author_Institution :
Case Western Reserve Univ., Cleaveland, OH, USA
Volume :
30
Issue :
3
fYear :
2013
fDate :
Jun-13
Firstpage :
6
Lastpage :
17
Abstract :
With the increasing disintegration of the design and manufacturing chain of our microelectronic products, we should not only worry about including unintentional, unwanted hardware features (“bugs”), but also about including intentional malicious hardware features: “Trojan Horses,”which act as spies or terrorists. This article provides an overview of hardware Trojans and countermeasures.
Keywords :
integrated circuit manufacture; integrated circuit reliability; invasive software; Trojan Horses; hardware Trojan attacks; intentional malicious hardware features; microelectronic products; Computer security; Hardware; Integrated circuits; Intellectual property; Logic testing; Switching circuits; Trojan horses; Hardware Trojan; hardware security;
fLanguage :
English
Journal_Title :
Design & Test, IEEE
Publisher :
ieee
ISSN :
2168-2356
Type :
jour
DOI :
10.1109/MDT.2012.2196252
Filename :
6189843
Link To Document :
بازگشت