Hardware Trojan Detection

被引:0
|
作者
Alluhaib, Ghalia [1 ]
Aldissi, Hanan [1 ]
Alqarni, Rasha [1 ]
Banafee, Shoroq [1 ]
Nagro, Wafaa [1 ]
Aljandali, Asia [1 ]
机构
[1] Univ Jeddah, Coll Comp Sci & Engn, Jeddah, Saudi Arabia
关键词
Hardware trojan; integrated circuit; threats; side channel analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study we present, overview structure of Integrated Circuit (IC), Trojans design and taxonomy that gives a primary step in higher understanding existing and probable threats and the most common techniques for Trojan detection against Hardware Trojan threats. As well countermeasures for hardware Trojan insertion to verify the trustworthiness of the manufactured ICs. Recently security of Integrated Circuits is exposed to hardware Trojans that emerged as a serious security threat, which are malicious alteration to the original circuit either during design or fabrication time. An attacker can easily add Hardware Trojan into Integrated Circuits. Since hardware Trojans are tiny and invisible, their detection is hard. Probably cause disaster effects (Denial of Service, sensitive information leakage from inside a chip-e.g., the key in a cryptographic chip, during field operation. etc.). Especially for those used in susceptible applications such as military or medical. Based on previous researches in Hardware Trojan papers, we conclude the importance of insurance the trustiness of Integrated Circuit (i.e.-protected against Hardware Trojans), where different methods have been proposed to void Hardware Trojans such as Optical Inspection, Side-Channel Analysis (SCA), Run Time Detection Techniques and Logic Test Techniques. The main result of this paper is to exhibit the mostly techniques used for detecting the Hardware Trojans to overcome from spread out the infected integrated circuit into market and reduce the rate of loose and disclosure of critical information.
引用
收藏
页码:141 / 147
页数:7
相关论文
共 50 条
  • [1] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    [J]. COMPUTER, 2019, 52 (06) : 4 - 5
  • [2] Survey of Hardware Trojan Threats and Detection
    Hayashi, Yuichi
    Kawamura, Shinichi
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [3] Character Reassignment for Hardware Trojan Detection
    Waller, Noah
    Nauman, Hunter
    Taylor, Derek
    Del Carmen, Rafael
    Di, Jia
    [J]. 2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 861 - 864
  • [4] Survey: Hardware Trojan Detection for Netlist
    Yang, Yipei
    Ye, Jing
    Cao, Yuan
    Zhang, Jiliang
    Li, Xiaowei
    Li, Huawei
    Hu, Yu
    [J]. 2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 48 - 53
  • [5] Smart Hardware Trojan Detection System
    Alkhazendar, Iyad
    Zubair, Mohammed
    Qidwai, Uvais
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, 2023, 544 : 791 - 806
  • [6] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [7] Towards a Hardware Trojan Detection Cycle
    Dabrowski, Adrian
    Hobel, Heidelinde
    Ullrich, Johanna
    Krombholz, Katharina
    Weippl, Edgar
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 287 - 294
  • [8] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    [J]. 2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [9] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    [J]. National Academy Science Letters, 2023, 46 : 521 - 524
  • [10] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362