DocumentCode
10150
Title
Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
Author
Bhunia, Swarup ; Abramovici, Miron ; Agrawal, Dakshi ; Bradley, Paul ; Hsiao, Michael S. ; Plusquellic, Jim ; Tehranipoor, Mohammad
Author_Institution
Case Western Reserve Univ., Cleaveland, OH, USA
Volume
30
Issue
3
fYear
2013
fDate
Jun-13
Firstpage
6
Lastpage
17
Abstract
With the increasing disintegration of the design and manufacturing chain of our microelectronic products, we should not only worry about including unintentional, unwanted hardware features (“bugs”), but also about including intentional malicious hardware features: “Trojan Horses,”which act as spies or terrorists. This article provides an overview of hardware Trojans and countermeasures.
Keywords
integrated circuit manufacture; integrated circuit reliability; invasive software; Trojan Horses; hardware Trojan attacks; intentional malicious hardware features; microelectronic products; Computer security; Hardware; Integrated circuits; Intellectual property; Logic testing; Switching circuits; Trojan horses; Hardware Trojan; hardware security;
fLanguage
English
Journal_Title
Design & Test, IEEE
Publisher
ieee
ISSN
2168-2356
Type
jour
DOI
10.1109/MDT.2012.2196252
Filename
6189843
Link To Document