Title :
Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
Author :
Bhunia, Swarup ; Abramovici, Miron ; Agrawal, Dakshi ; Bradley, Paul ; Hsiao, Michael S. ; Plusquellic, Jim ; Tehranipoor, Mohammad
Author_Institution :
Case Western Reserve Univ., Cleaveland, OH, USA
Abstract :
With the increasing disintegration of the design and manufacturing chain of our microelectronic products, we should not only worry about including unintentional, unwanted hardware features (“bugs”), but also about including intentional malicious hardware features: “Trojan Horses,”which act as spies or terrorists. This article provides an overview of hardware Trojans and countermeasures.
Keywords :
integrated circuit manufacture; integrated circuit reliability; invasive software; Trojan Horses; hardware Trojan attacks; intentional malicious hardware features; microelectronic products; Computer security; Hardware; Integrated circuits; Intellectual property; Logic testing; Switching circuits; Trojan horses; Hardware Trojan; hardware security;
Journal_Title :
Design & Test, IEEE
DOI :
10.1109/MDT.2012.2196252