DocumentCode :
39928
Title :
The Trojan-proof chip
Author :
Mitra, Subhasish ; Wong, H.-S Philip ; Wong, Simon
Volume :
52
Issue :
2
fYear :
2015
fDate :
Feb-15
Firstpage :
46
Lastpage :
51
Abstract :
A lot of research is still being devoted to understanding the scope of the problem. But solutions are already starting to emerge. In 2011, the United States´ Intelligence Advanced Research Projects Activity (IARPA) started a new program to explore ways to make trusted chips. As part of that program, our team at Stanford University, along with other research groups, is working on fundamental changes to the way integrated circuits are designed and manufactured. Today we try to protect against hardware Trojans by keeping careful tabs on where chips are made, limiting the opportunity for mischief by limiting who is authorized to make a chip. But if this research succeeds, it could make it practical for anyone to design and build a chip wherever they like and trust that it hasn´t been tampered with. More radically, our research could open up ways to let you use a chip even if there is a Trojan inside.
Keywords :
integrated circuit design; invasive software; Trojan-proof chip; hardware Trojans; integrated circuit design; integrated circuit manufacture; Computer crime; Computer viruses; Integrated circuits; Invasive software; Malware; Software development; Spyware; Trojan horses;
fLanguage :
English
Journal_Title :
Spectrum, IEEE
Publisher :
ieee
ISSN :
0018-9235
Type :
jour
DOI :
10.1109/MSPEC.2015.7024511
Filename :
7024511
Link To Document :
بازگشت