Title :
Extended abstract: Designer’s hardware Trojan horse
Author :
Alkabani, Yousra ; Koushanfar, Farinaz
Author_Institution :
CS Dept., Rice Univ., Houston, TX
Abstract :
We introduce the first approach for pre-synthesis embedding of hardware Trojan horses (HTHs) by the designer. The embedded HTH gives the designer a low layer control over the hardware that can be exploited post-manufacturing. We identify the essential components for the exploit, outline the pre-synthesis implementation, and discuss detection. The new HTH embedding approach is low-overhead, effective, and hard to detect/remove. We emphasize that the diagnosis and isolation of designerpsilas HTHs is a standing research challenge.
Keywords :
computer architecture; invasive software; extended abstract; hardware Trojan horses; low layer control; low-overhead; Cellular phones; Driver circuits; Embedded software; Foundries; Government; Hardware; Invasive software; Microarchitecture; Software design; System software;
Conference_Titel :
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on
Conference_Location :
Anaheim, CA
Print_ISBN :
978-1-4244-2401-6
DOI :
10.1109/HST.2008.4559059