Designer's hardware Trojan horse

被引:17
|
作者
Alkabani, Yousra [1 ]
Koushanfar, Farinaz [1 ]
机构
[1] Rice Univ, CS Dept, Houston, TX 77251 USA
关键词
D O I
10.1109/HST.2008.4559059
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the first approach for pre-synthesis embedding of hardware Trojan horses (HTHs) by the designer. The embedded HTH gives the designer a low layer control over the hardware that can be exploited post-manufacturing. We identify the essential components for the exploit, outline the pre-synthesis implementation, and discuss detection. The new HTH embedding approach is low-overhead, effective, and hard to detect/remove. We emphasize that the diagnosis and isolation of designer's HTHs is a standing research challenge.
引用
收藏
页码:82 / 83
页数:2
相关论文
共 50 条
  • [1] The Undetectable and Unprovable Hardware Trojan Horse
    Wei, Sheng
    Potkonjak, Miodrag
    [J]. 2013 50TH ACM / EDAC / IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2013,
  • [2] Code-Controlled Hardware Trojan Horse
    Gao, Hongbo
    Li, Qingbao
    Zhu, Yu
    Liu, Yong
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 171 - 178
  • [3] Design of Hardware Trojan Horse Based on Counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    [J]. 2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
  • [4] Sellafield's Trojan horse
    Edwards, R
    [J]. NEW SCIENTIST, 1996, 149 (2011) : 11 - 12
  • [5] Plutonium's Trojan horse
    Daniel J Kosman
    [J]. Nature Chemical Biology, 2011, 7 : 498 - 499
  • [6] Pharmacy's Trojan horse
    Davies, Neal M.
    [J]. CANADIAN PHARMACISTS JOURNAL, 2019, 152 (05) : 284 - 284
  • [7] An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation
    Marcelli, Andrea
    Restifo, Marco
    Sanchez, Ernesto
    Squillero, Giovanni
    [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1593 - 1598
  • [8] Hardware Trojan Horse device based on unintended USB channels
    Electrical and Computer Engineering Department, Royal Military College of Canada, Kingston, ON, Canada
    [J]. NSS - Netw. Syst. Secur., 1600, (1-8):
  • [9] Detection of Hardware Trojan Horse using Unsupervised Learning Approach
    Samyukta, K.
    Ramesh, S.R.
    [J]. 2023 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2023, 2023, : 77 - 82
  • [10] Hardware Trojan Horse Device based on Unintended USB Channels
    Clark, John
    Leblanc, Sylvain
    Knight, Scott
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 1 - 8