On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis
نویسندگان
چکیده
منابع مشابه
Hardware Trojan Detection Using Multi-Parameter Functional Side-Channel Analysis
A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design...
متن کاملThe First Thorough Side-Channel Hardware Trojan
Hardware Trojans have gained high attention in academia, industry and by government agencies. The effective detection mechanisms and countermeasures against such malicious designs are only possible when there is a deep understanding of how hardware Trojans can be built in practice. In this work, we present a mechanism which shows how easily a stealthy hardware Trojan can be inserted in a provab...
متن کاملTrojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry to implement hidden backdoors for unauthorized exposure of secret information. This paper proposes a new class of hardware Trojans which intentionally induce ph...
متن کاملA Multi-Parameter Functional Side Channel Analysis Method for Hardware Trojan Detection in Untrusted FPGA Bitstreams
vi
متن کاملSelf-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection
Malicious modification of integrated circuits (ICs) in untrusted foundry, referred to as “Hardware Trojan”, has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Security Journal: A Global Perspective
سال: 2013
ISSN: 1939-3555,1939-3547
DOI: 10.1080/19393555.2014.891277