Title :
Hardware Trojan: Threats and emerging solutions
Author :
Chakraborty, Rajat Subhra ; Narasimhan, Seetharam ; Bhunia, Swarup
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Case Western Reserve Univ., Cleveland, OH, USA
Abstract :
Malicious modification of hardware during design or fabrication has emerged as a major security concern. Such tampering (also referred to as Hardware Trojan) causes an integrated circuit (IC) to have altered functional behavior, potentially with disastrous consequences in safety-critical applications. Conventional design-time verification and post-manufacturing testing cannot be readily extended to detect hardware Trojans due to their stealthy nature, inordinately large number of possible instances and large variety in structure and operating mode. In this paper, we analyze the threat posed by hardware Trojans and the methods of deterring them. We present a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques. Next, we discuss the major challenges associated with this security concern and future research needs to address them.
Keywords :
integrated circuit design; invasive software; microprocessor chips; safety-critical software; Trojan detection technique; Trojan operation modelling; Trojan prevention technique; Trojan taxonomy; hardware Trojan horses; integrated circuit design; safety-critical applications; Application specific integrated circuits; Circuit testing; Electronic design automation and methodology; Fabrication; Hardware; Integrated circuit modeling; Integrated circuit testing; Manufacturing; Security; Taxonomy; Design for Security; Hardware Trojan;
Conference_Titel :
High Level Design Validation and Test Workshop, 2009. HLDVT 2009. IEEE International
Conference_Location :
San Francisco, CA
Print_ISBN :
978-1-4244-4823-4
Electronic_ISBN :
1552-6674
DOI :
10.1109/HLDVT.2009.5340158