Visible to the public Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs

TitleTutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs
Publication TypeConference Paper
Year of Publication2014
AuthorsTehranipoor, M., Forte, D.
Conference NameVLSI Design and 2014 13th International Conference on Embedded Systems, 2014 27th International Conference on
Date PublishedJan
KeywordsAwards activities, Conferences, counterfeit detection, counterfeit electronic parts, counterfeit IC, counterfeit prevention, Educational institutions, electronic component supply chain, Hardware, Hardware Trojans, hardware-software codesign, horizontal business model, integrated circuit testing, invasive software, life-critical systems, original IC designs, system integrity, Trojan horses, Tutorials, vertical business model, Very large scale integration
Abstract

The migration from a vertical to horizontal business model has made it easier to introduce hardware Trojans and counterfeit electronic parts into the electronic component supply chain. Hardware Trojans are malicious modifications made to original IC designs that reduce system integrity (change functionality, leak private data, etc.). Counterfeit parts are often below specification and/or of substandard quality. The existence of Trojans and counterfeit parts creates risks for the life-critical systems and infrastructures that incorporate them including automotive, aerospace, military, and medical systems. In this tutorial, we will cover: (i) Background and motivation for hardware Trojan and counterfeit prevention/detection; (ii) Taxonomies related to both topics; (iii) Existing solutions; (iv) Open challenges; (v) New and unified solutions to address these challenges.

DOI10.1109/VLSID.2014.119
Citation Key6733093