Title :
Rise of the hardware Trojans
Author_Institution :
Dept. of Electr. & Comput. Eng., Worcester Polytech. Inst., Worcester, MA, USA
Abstract :
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time or the Trojan may leak confidential information and secret keys covertly to the adversary. These vulnerabilities have raised serious concerns regarding possible threats to financial infrastructures, transportation security systems, and military systems. Clearly there is a strong motivation to classify and study adversarial hardware design modifications, i.e. hardware Trojan horses. Here we very briefly summarize types of hardware Trojans and refer the reader to relevant works.
Keywords :
integrated circuit design; integrated circuit manufacture; integrated circuit reliability; security of data; confidential information; financial infrastructure threat; hardware Trojan horse; manufacturing chain vulnerability; military system; secret keys; semiconductor design; semiconductor fabrication industries; transportation security system; Conferences; Hardware; Industries; Integrated circuits; Materials; Trojan horses;
Conference_Titel :
On-Line Testing Symposium (IOLTS), 2011 IEEE 17th International
Conference_Location :
Athens
Print_ISBN :
978-1-4577-1053-7
DOI :
10.1109/IOLTS.2011.5993826