Introduction to Hardware Trojan Detection Methods

被引:0
|
作者
Francq, Julien [1 ]
Frick, Florian [2 ]
机构
[1] Airbus Def & Space CyberSecur, 1 Bd Jean Moulin,CS 40001, F-78996 Metapole, Elancourt, France
[2] Univ Stuttgart, Inst Control Engn, Machine Tools & Mfg Units ISW, D-70174 Stuttgart, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans (HTs) are identified as an emerging threat for the integrity of Integrated Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the functionality of ICs by inserting HTs, potentially causing disastrous effects (Denial of Service, sensitive information leakage, etc.). Over the last 10 years, various methods have been proposed in literature to circumvent HTs. This article introduces the general context of HTs and summarizes the recent advances in HT detection from a French funded research project named HOMERE. Some of these results will be detailed in the related special session.
引用
收藏
页码:770 / 775
页数:6
相关论文
共 50 条
  • [31] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [32] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [33] Survey of Recent Developments for Hardware Trojan Detection
    Jain, Ayush
    Zhou, Ziqi
    Guin, Ujjwal
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [34] A New Testing Method for Hardware Trojan Detection
    Nejadmoghadam, Fahimeh
    Mahani, Ali
    Kavian, Yousef S.
    CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 713 - 719
  • [35] Hardware Trojan detection via rewriting logic
    Asavoae, Irina Mariuca
    Shirazi, Ramtine Tofighi
    Riesco, Adrian
    Yasuyoshi, Uemura
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 127
  • [36] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [37] Electromagnetic Circuit Fingerprints for Hardware Trojan Detection
    Balasch, Josep
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2015, : 246 - 251
  • [38] Hardware Trojan Detection using Xilinx Vivado
    Marlow, Ryan
    Harper, Scott
    Batchelor, Whitney
    Graf, Jonathan
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 86 - 91
  • [39] Process deviation calibration for hardware trojan detection
    Xiang, Yiyao
    Li, Lex
    Zhou, Wanting
    Gao, Hongbo
    2019 IEEE 3rd International Conference on Electronic Information Technology and Computer Engineering, EITCE 2019, 2019, : 1695 - 1699
  • [40] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85