[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/HST.2008.4559039guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Detecting malicious inclusions in secure hardware: Challenges and solutions

Published: 09 June 2008 Publication History

Abstract

This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost foundries has made ICs vulnerable to malicious alterations, that could, under specific conditions, result in functional changes and/or catastrophic failure of the system in which they are embedded. We refer to such malicious alternations and inclusions as Hardware Trojans. The modification(s) introduced by the Trojan depends on the application, with some designed to disable the system or degrade signal integrity, while others are designed to defeat hardware security and encryption to leak plain text information. This paper explores the wide range of malicious alternations of ICs that are possible and proposes a general framework for their classification. The taxonomy is essential for properly evaluating the effectiveness of methods designed to detect Trojans. The latter portion of the paper explores several Trojan detection strategies and the classes of Trojans each is most likely to detect.

Cited By

View all
  • (2022)A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized LayoutsProceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design10.1145/3508352.3549452(1-9)Online publication date: 30-Oct-2022
  • (2021)Trojan AwakenerProceedings of the 5th Workshop on Attacks and Solutions in Hardware Security10.1145/3474376.3487282(17-27)Online publication date: 19-Nov-2021
  • (2021)Hardware Trojan Horse Detection through Improved Switching of Dormant NetsACM Journal on Emerging Technologies in Computing Systems10.1145/343995117:3(1-22)Online publication date: 11-May-2021
  • Show More Cited By
  1. Detecting malicious inclusions in secure hardware: Challenges and solutions

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        HST '08: Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
        June 2008
        90 pages
        ISBN:9781424424016

        Publisher

        IEEE Computer Society

        United States

        Publication History

        Published: 09 June 2008

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 11 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized LayoutsProceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design10.1145/3508352.3549452(1-9)Online publication date: 30-Oct-2022
        • (2021)Trojan AwakenerProceedings of the 5th Workshop on Attacks and Solutions in Hardware Security10.1145/3474376.3487282(17-27)Online publication date: 19-Nov-2021
        • (2021)Hardware Trojan Horse Detection through Improved Switching of Dormant NetsACM Journal on Emerging Technologies in Computing Systems10.1145/343995117:3(1-22)Online publication date: 11-May-2021
        • (2020)Conventional and machine learning approaches as countermeasures against hardware trojan attacksMicroprocessors & Microsystems10.1016/j.micpro.2020.10329579:COnline publication date: 1-Nov-2020
        • (2019)Architectural Support for Containment-based SecurityProceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3297858.3304020(361-377)Online publication date: 4-Apr-2019
        • (2019)BOGOProceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3297858.3304017(631-644)Online publication date: 4-Apr-2019
        • (2018)Case StudyProceedings of the 8th International Conference on Communication and Network Security10.1145/3290480.3290492(64-68)Online publication date: 2-Nov-2018
        • (2018)On-Device Detection via Anomalous Environmental FactorsProceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop10.1145/3289239.3289246(1-8)Online publication date: 3-Dec-2018
        • (2017)An evolutionary approach to hardware encryption and trojan-horse mitigationProceedings of the Conference on Design, Automation & Test in Europe10.5555/3130379.3130750(1597-1602)Online publication date: 27-Mar-2017
        • (2017)Evaluating coherence-exploiting hardware trojanProceedings of the Conference on Design, Automation & Test in Europe10.5555/3130379.3130415(157-162)Online publication date: 27-Mar-2017
        • Show More Cited By

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media