DocumentCode
2890945
Title
Rise of the hardware Trojans
Author
Sunar, Berk
Author_Institution
Dept. of Electr. & Comput. Eng., Worcester Polytech. Inst., Worcester, MA, USA
fYear
2011
fDate
13-15 July 2011
Firstpage
138
Lastpage
138
Abstract
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time or the Trojan may leak confidential information and secret keys covertly to the adversary. These vulnerabilities have raised serious concerns regarding possible threats to financial infrastructures, transportation security systems, and military systems. Clearly there is a strong motivation to classify and study adversarial hardware design modifications, i.e. hardware Trojan horses. Here we very briefly summarize types of hardware Trojans and refer the reader to relevant works.
Keywords
integrated circuit design; integrated circuit manufacture; integrated circuit reliability; security of data; confidential information; financial infrastructure threat; hardware Trojan horse; manufacturing chain vulnerability; military system; secret keys; semiconductor design; semiconductor fabrication industries; transportation security system; Conferences; Hardware; Industries; Integrated circuits; Materials; Trojan horses;
fLanguage
English
Publisher
ieee
Conference_Titel
On-Line Testing Symposium (IOLTS), 2011 IEEE 17th International
Conference_Location
Athens
Print_ISBN
978-1-4577-1053-7
Type
conf
DOI
10.1109/IOLTS.2011.5993826
Filename
5993826
Link To Document