• DocumentCode
    1759445
  • Title

    Hardware Trojan Attacks: Threat Analysis and Countermeasures

  • Author

    Bhunia, Swarup ; Hsiao, Michael S. ; Banga, Mainak ; Narasimhan, Sriram

  • Author_Institution
    Case Western Reserve Univ., Cleveland, OH, USA
  • Volume
    102
  • Issue
    8
  • fYear
    2014
  • fDate
    Aug. 2014
  • Firstpage
    1229
  • Lastpage
    1247
  • Abstract
    Security of a computer system has been traditionally related to the security of the software or the information being processed. The underlying hardware used for information processing has been considered trusted. The emergence of hardware Trojan attacks violates this root of trust. These attacks, in the form of malicious modifications of electronic hardware at different stages of its life cycle, pose major security concerns in the electronics industry. An adversary can mount such an attack with an objective to cause operational failure or to leak secret information from inside a chip-e.g., the key in a cryptographic chip, during field operation. Global economic trend that encourages increased reliance on untrusted entities in the hardware design and fabrication process is rapidly enhancing the vulnerability to such attacks. In this paper, we analyze the threat of hardware Trojan attacks; present attack models, types, and scenarios; discuss different forms of protection approaches, both proactive and reactive; and describe emerging attack modes, defenses, and future research pathways.
  • Keywords
    electronics industry; invasive software; computer system security; electronic hardware malicious modifications; electronics industry; global economic trend; hardware Trojan attack; information processing; proactive protection approach; reactive protection approach; threat analysis; Circuit faults; Computer security; Fabrication; Hardware; Integrated circuit modeling; Integrated circuits; Trojan horses; Hardware intellectual property (IP) trust; Trojan detection; Trojan taxonomy; Trojan tolerance; hardware Trojan attacks; hardware obfuscation; self-referencing; side-channel analysis;
  • fLanguage
    English
  • Journal_Title
    Proceedings of the IEEE
  • Publisher
    ieee
  • ISSN
    0018-9219
  • Type

    jour

  • DOI
    10.1109/JPROC.2014.2334493
  • Filename
    6856140