Designer's hardware Trojan horse

被引:17
|
作者
Alkabani, Yousra [1 ]
Koushanfar, Farinaz [1 ]
机构
[1] Rice Univ, CS Dept, Houston, TX 77251 USA
关键词
D O I
10.1109/HST.2008.4559059
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the first approach for pre-synthesis embedding of hardware Trojan horses (HTHs) by the designer. The embedded HTH gives the designer a low layer control over the hardware that can be exploited post-manufacturing. We identify the essential components for the exploit, outline the pre-synthesis implementation, and discuss detection. The new HTH embedding approach is low-overhead, effective, and hard to detect/remove. We emphasize that the diagnosis and isolation of designer's HTHs is a standing research challenge.
引用
收藏
页码:82 / 83
页数:2
相关论文
共 50 条
  • [31] A hitchhiker's guide to the Trojan Horse Method
    Pizzone, R. G.
    Spitaleri, C.
    Cherubini, S.
    D'Agata, G.
    Guardo, G. L.
    Gulino, M.
    La Cognata, M.
    Lamia, L.
    Puglia, S. M. R.
    Rapisarda, G. G.
    Romano, S.
    Sergi, M. L.
    Sparta, R.
    Tumino, A.
    [J]. 8TH EUROPEAN SUMMER SCHOOL ON EXPERIMENTAL NUCLEAR ASTROPHYSICS (SANTA TECLA SCHOOL), 2016, 703
  • [32] STANDARD OIL AS LOCHNER'S TROJAN HORSE
    Meese, Alan J.
    [J]. SOUTHERN CALIFORNIA LAW REVIEW, 2012, 85 (03) : 783 - 813
  • [33] On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis
    Dupuis, Sophie
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    [J]. INFORMATION SECURITY JOURNAL, 2013, 22 (5-6): : 226 - 236
  • [34] Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry
    Wei, Sheng
    Li, Kai
    Koushanfar, Farinaz
    Potkonjak, Miodrag
    [J]. 2012 49TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2012, : 90 - 95
  • [35] Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels
    Chen, Yancang
    Zhou, Ying
    Wei, Pei
    Sui, Sai
    Zhao, Yaxin
    Zhang, Minlei
    Xie, Lunguo
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 111 - 114
  • [36] NEOLIBERALISM - TROJAN HORSE OR GIFT HORSE
    WILLIAMS, L
    [J]. SOCIALIST REVIEW, 1986, (89) : 134 - 135
  • [37] A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis
    Chakraborty, Rajat Subhra
    Pagliarini, Samuel
    Mathew, Jimson
    Rajendran, Sree Ranjani
    Devi, M. Nirmala
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (02) : 260 - 270
  • [38] A TROJAN HORSE FOR PESTS
    FUKUTO, TR
    [J]. CHEMTECH, 1985, 15 (06) : 362 - 367
  • [39] Trojan horse antibiotics
    Burke, Maria
    [J]. CHEMISTRY & INDUSTRY, 2021, 85 (05) : 7 - 7
  • [40] The Trojan Horse reconstruction
    Chondros, Thomas G.
    Milidonis, Kypros
    Paipetis, Stefanos
    Rossi, Cesare
    [J]. MECHANISM AND MACHINE THEORY, 2015, 90 : 261 - 282