Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs
Title | Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Tehranipoor, M., Forte, D. |
Conference Name | VLSI Design and 2014 13th International Conference on Embedded Systems, 2014 27th International Conference on |
Date Published | Jan |
Keywords | Awards activities, Conferences, counterfeit detection, counterfeit electronic parts, counterfeit IC, counterfeit prevention, Educational institutions, electronic component supply chain, Hardware, Hardware Trojans, hardware-software codesign, horizontal business model, integrated circuit testing, invasive software, life-critical systems, original IC designs, system integrity, Trojan horses, Tutorials, vertical business model, Very large scale integration |
Abstract | The migration from a vertical to horizontal business model has made it easier to introduce hardware Trojans and counterfeit electronic parts into the electronic component supply chain. Hardware Trojans are malicious modifications made to original IC designs that reduce system integrity (change functionality, leak private data, etc.). Counterfeit parts are often below specification and/or of substandard quality. The existence of Trojans and counterfeit parts creates risks for the life-critical systems and infrastructures that incorporate them including automotive, aerospace, military, and medical systems. In this tutorial, we will cover: (i) Background and motivation for hardware Trojan and counterfeit prevention/detection; (ii) Taxonomies related to both topics; (iii) Existing solutions; (iv) Open challenges; (v) New and unified solutions to address these challenges. |
DOI | 10.1109/VLSID.2014.119 |
Citation Key | 6733093 |
- hardware-software codesign
- Very large scale integration
- vertical business model
- Tutorials
- Trojan horses
- system integrity
- original IC designs
- life-critical systems
- invasive software
- integrated circuit testing
- horizontal business model
- Awards activities
- Hardware Trojans
- Hardware
- electronic component supply chain
- Educational institutions
- counterfeit prevention
- counterfeit IC
- counterfeit electronic parts
- counterfeit detection
- Conferences