• DocumentCode
    2890945
  • Title

    Rise of the hardware Trojans

  • Author

    Sunar, Berk

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Worcester Polytech. Inst., Worcester, MA, USA
  • fYear
    2011
  • fDate
    13-15 July 2011
  • Firstpage
    138
  • Lastpage
    138
  • Abstract
    Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time or the Trojan may leak confidential information and secret keys covertly to the adversary. These vulnerabilities have raised serious concerns regarding possible threats to financial infrastructures, transportation security systems, and military systems. Clearly there is a strong motivation to classify and study adversarial hardware design modifications, i.e. hardware Trojan horses. Here we very briefly summarize types of hardware Trojans and refer the reader to relevant works.
  • Keywords
    integrated circuit design; integrated circuit manufacture; integrated circuit reliability; security of data; confidential information; financial infrastructure threat; hardware Trojan horse; manufacturing chain vulnerability; military system; secret keys; semiconductor design; semiconductor fabrication industries; transportation security system; Conferences; Hardware; Industries; Integrated circuits; Materials; Trojan horses;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    On-Line Testing Symposium (IOLTS), 2011 IEEE 17th International
  • Conference_Location
    Athens
  • Print_ISBN
    978-1-4577-1053-7
  • Type

    conf

  • DOI
    10.1109/IOLTS.2011.5993826
  • Filename
    5993826