DocumentCode :
2053903
Title :
Extended abstract: Designer’s hardware Trojan horse
Author :
Alkabani, Yousra ; Koushanfar, Farinaz
Author_Institution :
CS Dept., Rice Univ., Houston, TX
fYear :
2008
fDate :
9-9 June 2008
Firstpage :
82
Lastpage :
83
Abstract :
We introduce the first approach for pre-synthesis embedding of hardware Trojan horses (HTHs) by the designer. The embedded HTH gives the designer a low layer control over the hardware that can be exploited post-manufacturing. We identify the essential components for the exploit, outline the pre-synthesis implementation, and discuss detection. The new HTH embedding approach is low-overhead, effective, and hard to detect/remove. We emphasize that the diagnosis and isolation of designerpsilas HTHs is a standing research challenge.
Keywords :
computer architecture; invasive software; extended abstract; hardware Trojan horses; low layer control; low-overhead; Cellular phones; Driver circuits; Embedded software; Foundries; Government; Hardware; Invasive software; Microarchitecture; Software design; System software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on
Conference_Location :
Anaheim, CA
Print_ISBN :
978-1-4244-2401-6
Type :
conf
DOI :
10.1109/HST.2008.4559059
Filename :
4559059
Link To Document :
بازگشت