Hardware Trojans
Top Cited Papers
- 27 May 2016
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Design Automation of Electronic Systems
- Vol. 22 (1), 1-23
- https://doi.org/10.1145/2906147
Abstract
Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially for those integrated circuits (ICs) and systems used in critical applications and cyber infrastructure. While hardware Trojans have been explored significantly in academia over the last decade, there remains room for improvement. In this article, we examine the research on hardware Trojans from the last decade and attempt to capture the lessons learned. A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art. Then the past countermeasures and publication trends are categorized based on the adversarial model and topic. Through this analysis, we identify what has been covered and the important problems that are underinvestigated. We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research.Keywords
Funding Information
- National Science Foundation (CNS-1558516)
This publication has 75 references indexed in Scilit:
- Detecting malicious modifications of data in third-party intellectual property coresPublished by Association for Computing Machinery (ACM) ,2015
- A Score-Based Classification Method for Identifying Hardware-Trojans at Gate-Level NetlistsPublished by EDAA ,2015
- Designing Trusted Embedded Systems from Finite State MachinesACM Transactions on Embedded Computing Systems, 2014
- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task SchedulingIEEE Transactions on Emerging Topics in Computing, 2014
- Hardware Trojan Attacks: Threat Analysis and CountermeasuresProceedings of the IEEE, 2014
- An Efficient Nonlinear Filter for Spacecraft Attitude EstimationInternational Journal of Aerospace Engineering, 2014
- Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege EscalationIEEE Transactions on Emerging Topics in Computing, 2013
- EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor NetworksEURASIP Journal on Wireless Communications and Networking, 2010
- Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$sIEEE Transactions on Information Forensics and Security, 2010
- MERO: A Statistical Approach for Hardware Trojan DetectionLecture Notes in Computer Science, 2009