Hardware Trojan Attacks: Threat Analysis and Countermeasures
Title | Hardware Trojan Attacks: Threat Analysis and Countermeasures |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S. |
Journal | Proceedings of the IEEE |
Volume | 102 |
Pagination | 1229-1247 |
Date Published | Aug |
ISSN | 0018-9219 |
Keywords | Circuit faults, computer security, computer system security, electronic hardware malicious modifications, electronics industry, fabrication, global economic trend, Hardware, Hardware intellectual property (IP) trust, hardware obfuscation, hardware Trojan attack, hardware Trojan attacks, information processing, Integrated circuit modeling, integrated circuits, invasive software, proactive protection approach, reactive protection approach, self-referencing, side-channel analysis, threat analysis, Trojan detection, Trojan horses, Trojan taxonomy, Trojan tolerance |
Abstract | Security of a computer system has been traditionally related to the security of the software or the information being processed. The underlying hardware used for information processing has been considered trusted. The emergence of hardware Trojan attacks violates this root of trust. These attacks, in the form of malicious modifications of electronic hardware at different stages of its life cycle, pose major security concerns in the electronics industry. An adversary can mount such an attack with an objective to cause operational failure or to leak secret information from inside a chip-e.g., the key in a cryptographic chip, during field operation. Global economic trend that encourages increased reliance on untrusted entities in the hardware design and fabrication process is rapidly enhancing the vulnerability to such attacks. In this paper, we analyze the threat of hardware Trojan attacks; present attack models, types, and scenarios; discuss different forms of protection approaches, both proactive and reactive; and describe emerging attack modes, defenses, and future research pathways. |
DOI | 10.1109/JPROC.2014.2334493 |
Citation Key | 6856140 |
- information processing
- Trojan tolerance
- Trojan taxonomy
- Trojan horses
- Trojan detection
- threat analysis
- side-channel analysis
- self-referencing
- reactive protection approach
- proactive protection approach
- invasive software
- integrated circuits
- Integrated circuit modeling
- Circuit faults
- hardware Trojan attacks
- hardware Trojan attack
- hardware obfuscation
- Hardware intellectual property (IP) trust
- Hardware
- global economic trend
- fabrication
- electronics industry
- electronic hardware malicious modifications
- computer system security
- computer security