Skip to main content
Erschienen in: Journal of Cryptographic Engineering 4/2022

16.07.2022 | Regular Paper

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

verfasst von: Rijoy Mukherjee, Sree Ranjani Rajendran, Rajat Subhra Chakraborty

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Abramovici, M., Bradley, P.: Integrated circuit security: new threats and solutions. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1–3 (2009) Abramovici, M., Bradley, P.: Integrated circuit security: new threats and solutions. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1–3 (2009)
3.
Zurück zum Zitat Adibelli, S., Juyal, P., Nguyen, L.N., Prvulovic, M., Zajic, A.: Near field backscattering based sensing for hardware Trojan detection. IEEE Trans. Antennas Propag. 68(12), 8082–8090 (2020)CrossRef Adibelli, S., Juyal, P., Nguyen, L.N., Prvulovic, M., Zajic, A.: Near field backscattering based sensing for hardware Trojan detection. IEEE Trans. Antennas Propag. 68(12), 8082–8090 (2020)CrossRef
4.
Zurück zum Zitat Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: 2007 IEEE Symposium on Security and Privacy (SP ’07), pp. 296–310 (2007) Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: 2007 IEEE Symposium on Security and Privacy (SP ’07), pp. 296–310 (2007)
5.
Zurück zum Zitat Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 296–310. IEEE (2007) Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 296–310. IEEE (2007)
7.
Zurück zum Zitat Alkabani, Y., Koushanfar, F.: Consistency-based characterization for IC Trojan detection. In: 2009 IEEE/ACM International Conference on Computer-Aided Design—Digest of Technical Papers, pp. 123–127 (2009) Alkabani, Y., Koushanfar, F.: Consistency-based characterization for IC Trojan detection. In: 2009 IEEE/ACM International Conference on Computer-Aided Design—Digest of Technical Papers, pp. 123–127 (2009)
9.
Zurück zum Zitat Amir, S., Shakya, B., Xu, X., Jin, Y., Bhunia, S., Tehranipoor, M., Forte, D.: Development and evaluation of hardware obfuscation benchmarks. J. Hardw. Syst. Secur. 2(2), 142–161 (2018)CrossRef Amir, S., Shakya, B., Xu, X., Jin, Y., Bhunia, S., Tehranipoor, M., Forte, D.: Development and evaluation of hardware obfuscation benchmarks. J. Hardw. Syst. Secur. 2(2), 142–161 (2018)CrossRef
10.
Zurück zum Zitat Amyeen, M.E., Venkataraman, S., Ojha, A., Lee, S.: Evaluation of the quality of N-detect scan ATPG patterns on a processor. In: 2004 International Conference on Test, pp. 669–678. IEEE (2004) Amyeen, M.E., Venkataraman, S., Ojha, A., Lee, S.: Evaluation of the quality of N-detect scan ATPG patterns on a processor. In: 2004 International Conference on Test, pp. 669–678. IEEE (2004)
11.
Zurück zum Zitat Ba, P.S., Dupuis, S., Flottes, M.L., Di Natale, G., Rouzeyre, B.: Using outliers to detect stealthy hardware Trojan triggering? In: 2016 1st IEEE International Verification and Security Workshop (IVSW), pp. 1–6. IEEE (2016) Ba, P.S., Dupuis, S., Flottes, M.L., Di Natale, G., Rouzeyre, B.: Using outliers to detect stealthy hardware Trojan triggering? In: 2016 1st IEEE International Verification and Security Workshop (IVSW), pp. 1–6. IEEE (2016)
12.
Zurück zum Zitat Balasch, J., Gierlichs, B., Verbauwhede, I.: Electromagnetic circuit fingerprints for hardware Trojan detection. In: 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC), pp. 246–251 (2015) Balasch, J., Gierlichs, B., Verbauwhede, I.: Electromagnetic circuit fingerprints for hardware Trojan detection. In: 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC), pp. 246–251 (2015)
13.
Zurück zum Zitat Banga, M., Hsiao, M.S.: A region based approach for the identification of hardware Trojans. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 40–47 (2008) Banga, M., Hsiao, M.S.: A region based approach for the identification of hardware Trojans. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 40–47 (2008)
14.
Zurück zum Zitat Banga, M., Hsiao, M.S.: A novel sustained vector technique for the detection of hardware Trojans. In: 2009 22nd International Conference on VLSI Design, pp. 327–332 (2009) Banga, M., Hsiao, M.S.: A novel sustained vector technique for the detection of hardware Trojans. In: 2009 22nd International Conference on VLSI Design, pp. 327–332 (2009)
15.
Zurück zum Zitat Banga, M., Chandrasekar, M., Fang, L., Hsiao, M.S.: Guided test generation for isolation and detection of embedded Trojans in ICs. In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI, pp. 363–366. GLSVLSI ’08, Association for Computing Machinery, New York, NY, USA (2008). https://doi.org/10.1145/13661101366196 Banga, M., Chandrasekar, M., Fang, L., Hsiao, M.S.: Guided test generation for isolation and detection of embedded Trojans in ICs. In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI, pp. 363–366. GLSVLSI ’08, Association for Computing Machinery, New York, NY, USA (2008). https://​doi.​org/​10.​1145/​13661101366196
16.
Zurück zum Zitat Banga, M., Chandrasekar, M., Fang, L., Hsiao, M.S.: Guided test generation for isolation and detection of embedded Trojans in ICs. In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI, pp. 363–366. ACM (2008) Banga, M., Chandrasekar, M., Fang, L., Hsiao, M.S.: Guided test generation for isolation and detection of embedded Trojans in ICs. In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI, pp. 363–366. ACM (2008)
17.
Zurück zum Zitat Banga, M., Hsiao, M.S.: Trusted RTL: Trojan detection methodology in pre-silicon designs. In: 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 56–59. IEEE (2010) Banga, M., Hsiao, M.S.: Trusted RTL: Trojan detection methodology in pre-silicon designs. In: 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 56–59. IEEE (2010)
18.
Zurück zum Zitat Bao, C., Forte, D., Srivastava, A.: Temperature tracking: toward robust run-time detection of hardware Trojans. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(10), 1577–1585 (2015)CrossRef Bao, C., Forte, D., Srivastava, A.: Temperature tracking: toward robust run-time detection of hardware Trojans. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(10), 1577–1585 (2015)CrossRef
21.
Zurück zum Zitat Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M.S., Plusquellic, J., Tehranipoor, M.: Protection against hardware Trojan attacks: towards a comprehensive solution. IEEE Des. Test 30(3), 6–17 (2013)CrossRef Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M.S., Plusquellic, J., Tehranipoor, M.: Protection against hardware Trojan attacks: towards a comprehensive solution. IEEE Des. Test 30(3), 6–17 (2013)CrossRef
22.
Zurück zum Zitat Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware Trojan attacks: threat, analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)CrossRef Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware Trojan attacks: threat, analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)CrossRef
23.
Zurück zum Zitat Bhunia, S., Tehranipoor, M.M.: The Hardware Trojan War: Attacks, Myths, and Defenses, 1st edn. Springer, Berlin (2017) Bhunia, S., Tehranipoor, M.M.: The Hardware Trojan War: Attacks, Myths, and Defenses, 1st edn. Springer, Berlin (2017)
24.
Zurück zum Zitat Bloom, G., Narahari, B., Simha, R.: OS support for detecting Trojan circuit attacks. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 100–103. IEEE (2009) Bloom, G., Narahari, B., Simha, R.: OS support for detecting Trojan circuit attacks. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 100–103. IEEE (2009)
25.
Zurück zum Zitat Bloom, G., Narahari, B., Simha, R., Zambreno, J.: Providing Secure execution environments with a last line of defense against Trojan circuit attacks. Comput. Secur. 28(7), 660–669 (2009)CrossRef Bloom, G., Narahari, B., Simha, R., Zambreno, J.: Providing Secure execution environments with a last line of defense against Trojan circuit attacks. Comput. Secur. 28(7), 660–669 (2009)CrossRef
26.
Zurück zum Zitat Bright, P.: Meltdown and spectre: here’s what Intel, Apple, Microsoft, others are doing about it. Ars Technica. 5 January (2018) Bright, P.: Meltdown and spectre: here’s what Intel, Apple, Microsoft, others are doing about it. Ars Technica. 5 January (2018)
27.
Zurück zum Zitat Cha, B., Gupta, S.K.: Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost. In: 2013 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1265–1270 (2013) Cha, B., Gupta, S.K.: Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost. In: 2013 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1265–1270 (2013)
28.
Zurück zum Zitat Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: 2009 IEEE International high level design validation and test workshop, pp. 166–171. IEEE (2009) Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: 2009 IEEE International high level design validation and test workshop, pp. 166–171. IEEE (2009)
29.
Zurück zum Zitat Chakraborty, R.S., Bhunia, S.: Security against hardware Trojan through a novel application of design obfuscation. In: 2009 IEEE/ACM International Conference on Computer-Aided Design-Digest of Technical Papers, pp. 113–116. IEEE (2009) Chakraborty, R.S., Bhunia, S.: Security against hardware Trojan through a novel application of design obfuscation. In: 2009 IEEE/ACM International Conference on Computer-Aided Design-Digest of Technical Papers, pp. 113–116. IEEE (2009)
30.
Zurück zum Zitat Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 396–410. Springer (2009) Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 396–410. Springer (2009)
31.
Zurück zum Zitat Chen, Z., Guo, S., Wang, J., Li, Y., Lu, Z.: Toward FPGA security in IoT: a new detection technique for hardware Trojans. IEEE Internet Things J. 6(4), 7061–7068 (2019)CrossRef Chen, Z., Guo, S., Wang, J., Li, Y., Lu, Z.: Toward FPGA security in IoT: a new detection technique for hardware Trojans. IEEE Internet Things J. 6(4), 7061–7068 (2019)CrossRef
32.
Zurück zum Zitat Courbon, F., Loubet-Moundi, P., Fournier, J.J., Tria, A.: A High efficiency hardware Trojan detection technique based on fast SEM imaging. In: 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 788–793 (2015). https://doi.org/10.7873/DATE.2015.1104 Courbon, F., Loubet-Moundi, P., Fournier, J.J., Tria, A.: A High efficiency hardware Trojan detection technique based on fast SEM imaging. In: 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 788–793 (2015). https://​doi.​org/​10.​7873/​DATE.​2015.​1104
35.
Zurück zum Zitat Cozzi, M., Galliere, J.M., Maurine, P.: Thermal scans for detecting hardware Trojans. In: Fan, J., Gierlichs, B. (eds.) Constructive Side-Channel Analysis and Secure Design, pp. 117–132. Springer International Publishing, Cham (2018)CrossRef Cozzi, M., Galliere, J.M., Maurine, P.: Thermal scans for detecting hardware Trojans. In: Fan, J., Gierlichs, B. (eds.) Constructive Side-Channel Analysis and Secure Design, pp. 117–132. Springer International Publishing, Cham (2018)CrossRef
37.
Zurück zum Zitat Cruz, J., Farahmandi, F., Ahmed, A., Mishra, P.: Hardware Trojan detection using ATPG and model checking. In: 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), pp. 91–96. IEEE (2018) Cruz, J., Farahmandi, F., Ahmed, A., Mishra, P.: Hardware Trojan detection using ATPG and model checking. In: 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), pp. 91–96. IEEE (2018)
39.
Zurück zum Zitat Dupuis, S., Ba, P.S., Flottes, M.L., Di Natale, G., Rouzeyre, B.: New testing procedure for finding insertion sites of stealthy hardware Trojans. In: 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 776–781. IEEE (2015) Dupuis, S., Ba, P.S., Flottes, M.L., Di Natale, G., Rouzeyre, B.: New testing procedure for finding insertion sites of stealthy hardware Trojans. In: 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 776–781. IEEE (2015)
40.
Zurück zum Zitat Dupuis, S., Flottes, M.L., Di Natale, G., Rouzeyre, B.: Protection against hardware Trojans with logic testing: proposed solutions and challenges ahead. IEEE Des. Test 35(2), 73–90 (2017)CrossRef Dupuis, S., Flottes, M.L., Di Natale, G., Rouzeyre, B.: Protection against hardware Trojans with logic testing: proposed solutions and challenges ahead. IEEE Des. Test 35(2), 73–90 (2017)CrossRef
41.
Zurück zum Zitat Esirci, F.N., Bayrakci, A.A.: Hardware Trojan detection based on correlated path delays in defiance of variations with spatial correlations. In: Design, Automation Test in Europe Conference Exhibition (DATE), 2017, pp. 163–168 (2017) Esirci, F.N., Bayrakci, A.A.: Hardware Trojan detection based on correlated path delays in defiance of variations with spatial correlations. In: Design, Automation Test in Europe Conference Exhibition (DATE), 2017, pp. 163–168 (2017)
42.
Zurück zum Zitat Exurville, I., Zussa, L., Rigaud, J., Robisson, B.: Resilient hardware Trojans detection based on path delay measurements. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 151–156 (2015) Exurville, I., Zussa, L., Rigaud, J., Robisson, B.: Resilient hardware Trojans detection based on path delay measurements. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 151–156 (2015)
44.
Zurück zum Zitat Ferraiuolo, A., Zhang, X., Tehranipoor, M.: Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90 nm ASIC. In: 2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 37–42 (2012) Ferraiuolo, A., Zhang, X., Tehranipoor, M.: Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90 nm ASIC. In: 2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 37–42 (2012)
45.
Zurück zum Zitat Forte, D., Bao, C., Srivastava, A.: Temperature tracking: an innovative run-time approach for hardware Trojan detection. In: 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 532–539 (2013) Forte, D., Bao, C., Srivastava, A.: Temperature tracking: an innovative run-time approach for hardware Trojan detection. In: 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 532–539 (2013)
46.
Zurück zum Zitat Fournaris, A.P., Pyrgas, L., Kitsos, P.: An FPGA hardware Trojan detection approach based on multiple parameter analysis. In: 2018 21st Euromicro Conference on Digital System Design (DSD), pp. 516–522 (2018) Fournaris, A.P., Pyrgas, L., Kitsos, P.: An FPGA hardware Trojan detection approach based on multiple parameter analysis. In: 2018 21st Euromicro Conference on Digital System Design (DSD), pp. 516–522 (2018)
47.
Zurück zum Zitat Guin, U., Huang, K., DiMase, D., Carulli, J.M., Tehranipoor, M., Makris, Y.: Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc. IEEE 102(8), 1207–1228 (2014)CrossRef Guin, U., Huang, K., DiMase, D., Carulli, J.M., Tehranipoor, M., Makris, Y.: Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc. IEEE 102(8), 1207–1228 (2014)CrossRef
48.
Zurück zum Zitat Haider, S.K., Jin, C., Ahmad, M., Shila, D.M., Khan, O., van Dijk, M.: Advancing the state-of-the-art in hardware Trojans detection. IEEE Trans. Dependable Secur. Comput. 16(1), 18–32 (2017)CrossRef Haider, S.K., Jin, C., Ahmad, M., Shila, D.M., Khan, O., van Dijk, M.: Advancing the state-of-the-art in hardware Trojans detection. IEEE Trans. Dependable Secur. Comput. 16(1), 18–32 (2017)CrossRef
49.
Zurück zum Zitat Haider, S.K., Jin, C., van Dijk, M.: Advancing the state-of-the-art in hardware Trojans design. In: 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 823–826. IEEE (2017) Haider, S.K., Jin, C., van Dijk, M.: Advancing the state-of-the-art in hardware Trojans design. In: 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 823–826. IEEE (2017)
50.
Zurück zum Zitat Harada, L.L.: Semiconductor technology and U.S. National Security. Technical report, ARMY WAR COLL CARLISLE BARRACKS PA (2010) Harada, L.L.: Semiconductor technology and U.S. National Security. Technical report, ARMY WAR COLL CARLISLE BARRACKS PA (2010)
51.
Zurück zum Zitat Hasegawa, K., Shi, Y., Togawa, N.: Hardware Trojan detection utilizing machine learning approaches. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1891–1896 (2018) Hasegawa, K., Shi, Y., Togawa, N.: Hardware Trojan detection utilizing machine learning approaches. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1891–1896 (2018)
52.
Zurück zum Zitat He, J., Zhao, Y., Guo, X., Jin, Y.: Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25(10), 2939–2948 (2017)CrossRef He, J., Zhao, Y., Guo, X., Jin, Y.: Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25(10), 2939–2948 (2017)CrossRef
53.
Zurück zum Zitat Hicks, M., Finnicum, M., King, S.T., Martin, M.M., Smith, J.M.: Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: 2010 IEEE Symposium on Security and Privacy, pp. 159–172. IEEE (2010) Hicks, M., Finnicum, M., King, S.T., Martin, M.M., Smith, J.M.: Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: 2010 IEEE Symposium on Security and Privacy, pp. 159–172. IEEE (2010)
54.
Zurück zum Zitat Schneider, W., Chairman, F.: Defense Science Board Task Force on High Performance Microchip Supply. Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington (2005) Schneider, W., Chairman, F.: Defense Science Board Task Force on High Performance Microchip Supply. Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington (2005)
55.
Zurück zum Zitat Hou, B., He, C., Wang, L., En, Y., Xie, S.: Hardware Trojan detection via current measurement: a method immune to process variation effects. In: 2014 10th International Conference on Reliability, Maintainability and Safety (ICRMS), pp. 1039–1042 (2014) Hou, B., He, C., Wang, L., En, Y., Xie, S.: Hardware Trojan detection via current measurement: a method immune to process variation effects. In: 2014 10th International Conference on Reliability, Maintainability and Safety (ICRMS), pp. 1039–1042 (2014)
56.
Zurück zum Zitat Hu, K., Nowroz, A.N., Reda, S., Koushanfar, F.: High-sensitivity hardware Trojan detection using multimodal characterization. In: 2013 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1271–1276 (2013) Hu, K., Nowroz, A.N., Reda, S., Koushanfar, F.: High-sensitivity hardware Trojan detection using multimodal characterization. In: 2013 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1271–1276 (2013)
57.
Zurück zum Zitat Huang, Y., Bhunia, S., Mishra, P.: Scalable test generation for Trojan detection using side channel analysis. IEEE Trans. Inf. Forensics Secur. 13(11), 2746–2760 (2018)CrossRef Huang, Y., Bhunia, S., Mishra, P.: Scalable test generation for Trojan detection using side channel analysis. IEEE Trans. Inf. Forensics Secur. 13(11), 2746–2760 (2018)CrossRef
58.
Zurück zum Zitat Huang, Y., Bhunia, S., Mishra, P.: MERS: statistical test generation for side-channel analysis based Trojan detection. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 130–141. CCS ’16, Association for Computing Machinery, New York, NY, USA (2016). https://doi.org/10.1145/2976749.2978396 Huang, Y., Bhunia, S., Mishra, P.: MERS: statistical test generation for side-channel analysis based Trojan detection. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 130–141. CCS ’16, Association for Computing Machinery, New York, NY, USA (2016). https://​doi.​org/​10.​1145/​2976749.​2978396
59.
Zurück zum Zitat Ismari, D., Plusquellic, J., Lamech, C., Bhunia, S., Saqib, F.: On detecting delay anomalies introduced by hardware Trojans. In: 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1–7 (2016) Ismari, D., Plusquellic, J., Lamech, C., Bhunia, S., Saqib, F.: On detecting delay anomalies introduced by hardware Trojans. In: 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1–7 (2016)
60.
Zurück zum Zitat Jacob, N., Merli, D., Heyszl, J., Sigl, G.: Hardware Trojans: current challenges and approaches. IET Comput. Digit. Tech. 8(6), 264–273 (2014)CrossRef Jacob, N., Merli, D., Heyszl, J., Sigl, G.: Hardware Trojans: current challenges and approaches. IET Comput. Digit. Tech. 8(6), 264–273 (2014)CrossRef
61.
Zurück zum Zitat Jap, D., Wei He, Bhasin, S.: Supervised and unsupervised machine learning for side-channel based Trojan detection. In: 2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP), pp. 17–24 (2016) Jap, D., Wei He, Bhasin, S.: Supervised and unsupervised machine learning for side-channel based Trojan detection. In: 2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP), pp. 17–24 (2016)
62.
Zurück zum Zitat Jha, S., Jha, S.K.: Randomization based probabilistic approach to detect Trojan circuits. In: 2008 11th IEEE High Assurance Systems Engineering Symposium, pp. 117–124. IEEE (2008) Jha, S., Jha, S.K.: Randomization based probabilistic approach to detect Trojan circuits. In: 2008 11th IEEE High Assurance Systems Engineering Symposium, pp. 117–124. IEEE (2008)
63.
Zurück zum Zitat Jie Li, Lach, J.: At-speed delay characterization for IC authentication and Trojan horse detection. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 8–14 (2008) Jie Li, Lach, J.: At-speed delay characterization for IC authentication and Trojan horse detection. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 8–14 (2008)
64.
Zurück zum Zitat Koushanfar, F., Mirhoseini, A.: A unified framework for multimodal submodular integrated circuits Trojan detection. IEEE Trans. Inf. Forensics Secur. 6(1), 162–174 (2011)CrossRef Koushanfar, F., Mirhoseini, A.: A unified framework for multimodal submodular integrated circuits Trojan detection. IEEE Trans. Inf. Forensics Secur. 6(1), 162–174 (2011)CrossRef
65.
Zurück zum Zitat Krieg, C., Rathmair, M., Schupfer, F.: A process for the detection of design-level hardware Trojans using verification methods. In: 2014 IEEE International Conference on High Performance Computing and Communications, 2014 IEEE 6th International Symposium on Cyberspace Safety and Security, 2014 IEEE 11th International Conference on Embedded Software and System (HPCC, CSS, ICESS), pp. 729–734. IEEE (2014) Krieg, C., Rathmair, M., Schupfer, F.: A process for the detection of design-level hardware Trojans using verification methods. In: 2014 IEEE International Conference on High Performance Computing and Communications, 2014 IEEE 6th International Symposium on Cyberspace Safety and Security, 2014 IEEE 11th International Conference on Embedded Software and System (HPCC, CSS, ICESS), pp. 729–734. IEEE (2014)
66.
Zurück zum Zitat Lamech, C., Plusquellic, J.: Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 75–82 (2012) Lamech, C., Plusquellic, J.: Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 75–82 (2012)
67.
Zurück zum Zitat Lecomte, M., Fournier, J., Maurine, P.: An on-chip technique to detect hardware Trojans and assist counterfeit identification. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25(12), 3317–3330 (2017)CrossRef Lecomte, M., Fournier, J., Maurine, P.: An on-chip technique to detect hardware Trojans and assist counterfeit identification. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25(12), 3317–3330 (2017)CrossRef
68.
Zurück zum Zitat Li, H., Liu, Q.: Hardware Trojan detection acceleration based on word-level statistical properties management. In: 2014 International Conference on Field-Programmable Technology (FPT), pp. 153–160. IEEE (2014) Li, H., Liu, Q.: Hardware Trojan detection acceleration based on word-level statistical properties management. In: 2014 International Conference on Field-Programmable Technology (FPT), pp. 153–160. IEEE (2014)
69.
Zurück zum Zitat Li, H., Liu, Q., Zhang, J.: A survey of hardware Trojan threat and defense. Integration 55, 426–437 (2016)CrossRef Li, H., Liu, Q., Zhang, J.: A survey of hardware Trojan threat and defense. Integration 55, 426–437 (2016)CrossRef
70.
Zurück zum Zitat Li, M., Davoodi, A., Tehranipoor, M.: A sensor-assisted self-authentication framework for hardware Trojan detection. In: 2012 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1331–1336 (2012) Li, M., Davoodi, A., Tehranipoor, M.: A sensor-assisted self-authentication framework for hardware Trojan detection. In: 2012 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1331–1336 (2012)
71.
Zurück zum Zitat Liu, Y., Huang, K., Makris, Y.: Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting. In: 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6 (2014) Liu, Y., Huang, K., Makris, Y.: Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting. In: 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6 (2014)
72.
73.
Zurück zum Zitat Lodhi, F.K., Hasan, S.R., Hasan, O., Awwadl, F.: Power profiling of microcontroller’s instruction set for runtime hardware Trojans detection without golden circuit models. In: Design, Automation Test in Europe Conference Exhibition (DATE), 2017, pp. 294–297 (2017). https://doi.org/10.23919/DATE.2017.7927002 Lodhi, F.K., Hasan, S.R., Hasan, O., Awwadl, F.: Power profiling of microcontroller’s instruction set for runtime hardware Trojans detection without golden circuit models. In: Design, Automation Test in Europe Conference Exhibition (DATE), 2017, pp. 294–297 (2017). https://​doi.​org/​10.​23919/​DATE.​2017.​7927002
74.
Zurück zum Zitat Lyu, Y., Mishra, P.: Efficient test generation for Trojan detection using side channel analysis. In: 2019 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 408–413 (2019) Lyu, Y., Mishra, P.: Efficient test generation for Trojan detection using side channel analysis. In: 2019 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 408–413 (2019)
75.
Zurück zum Zitat Lyu, Y., Mishra, P.: Automated test generation for Trojan detection using delay-based side channel analysis. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1031–1036 (2020) Lyu, Y., Mishra, P.: Automated test generation for Trojan detection using delay-based side channel analysis. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1031–1036 (2020)
76.
Zurück zum Zitat Mishra, P., Bhunia, S., Tehranipoor, M.: Hardware IP Security and Trust. Springer, Berlin (2017)CrossRef Mishra, P., Bhunia, S., Tehranipoor, M.: Hardware IP Security and Trust. Springer, Berlin (2017)CrossRef
77.
Zurück zum Zitat Narasimhan, S., Du, D., Chakraborty, R.S., Paul, S., Wolff1, F., Papachristou, C., Roy, K., Bhunia, S.: Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 13–18 (2010) Narasimhan, S., Du, D., Chakraborty, R.S., Paul, S., Wolff1, F., Papachristou, C., Roy, K., Bhunia, S.: Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 13–18 (2010)
78.
Zurück zum Zitat Narasimhan, S., Wang, X., Du, D., Chakraborty, R.S., Bhunia, S.: TeSR: a robust temporal self-referencing approach for hardware Trojan detection. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 71–74 (2011) Narasimhan, S., Wang, X., Du, D., Chakraborty, R.S., Bhunia, S.: TeSR: a robust temporal self-referencing approach for hardware Trojan detection. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 71–74 (2011)
79.
Zurück zum Zitat Ngo, X., Exurville, I., Bhasin, S., Danger, J., Guilley, S., Najm, Z., Rigaud, J., Robisson, B.: Hardware Trojan detection by delay and electromagnetic measurements. In: 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 782–787 (2015) Ngo, X., Exurville, I., Bhasin, S., Danger, J., Guilley, S., Najm, Z., Rigaud, J., Robisson, B.: Hardware Trojan detection by delay and electromagnetic measurements. In: 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 782–787 (2015)
80.
Zurück zum Zitat Ngo, X.T., Bhasin, S., Danger, J.L., Guilley, S., Najm, Z.: Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 82–87. IEEE (2015) Ngo, X.T., Bhasin, S., Danger, J.L., Guilley, S., Najm, Z.: Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 82–87. IEEE (2015)
82.
Zurück zum Zitat Nguyen, L.N., Cheng, C., Prvulovic, M., Zajić, A.: Creating a backscattering side channel to enable detection of dormant hardware Trojans. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 27(7), 1561–1574 (2019)CrossRef Nguyen, L.N., Cheng, C., Prvulovic, M., Zajić, A.: Creating a backscattering side channel to enable detection of dormant hardware Trojans. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 27(7), 1561–1574 (2019)CrossRef
83.
Zurück zum Zitat Nigh, C., Orailoglu, A.: Test pattern superposition to detect hardware Trojans. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 25–30. IEEE (2020) Nigh, C., Orailoglu, A.: Test pattern superposition to detect hardware Trojans. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 25–30. IEEE (2020)
85.
Zurück zum Zitat Nowroz, A.N., Hu, K., Koushanfar, F., Reda, S.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(12), 1792–1805 (2014)CrossRef Nowroz, A.N., Hu, K., Koushanfar, F., Reda, S.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(12), 1792–1805 (2014)CrossRef
86.
Zurück zum Zitat Pan, Z., Mishra, P.: Automated test generation for hardware Trojan detection using reinforcement learning. In: 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 408–413 (2021) Pan, Z., Mishra, P.: Automated test generation for hardware Trojan detection using reinforcement learning. In: 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 408–413 (2021)
87.
Zurück zum Zitat Potkonjak, M., Nahapetian, A., Nelson, M., Massey, T.: Hardware Trojan horse detection using gate-level characterization. In: 2009 46th ACM/IEEE Design Automation Conference, pp. 688–693 (2009) Potkonjak, M., Nahapetian, A., Nelson, M., Massey, T.: Hardware Trojan horse detection using gate-level characterization. In: 2009 46th ACM/IEEE Design Automation Conference, pp. 688–693 (2009)
88.
89.
Zurück zum Zitat Rad, R., Plusquellic, J., Tehranipoor, M.: Sensitivity analysis to hardware Trojans using power supply transient signals. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 3–7 (2008) Rad, R., Plusquellic, J., Tehranipoor, M.: Sensitivity analysis to hardware Trojans using power supply transient signals. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 3–7 (2008)
90.
Zurück zum Zitat Rad, R.M., Wang, X., Tehranipoor, M., Plusquellic, J.: Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: 2008 IEEE/ACM International Conference on Computer-Aided Design, pp. 632–639 (2008) Rad, R.M., Wang, X., Tehranipoor, M., Plusquellic, J.: Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: 2008 IEEE/ACM International Conference on Computer-Aided Design, pp. 632–639 (2008)
91.
Zurück zum Zitat Rad, R.M., Wang, X., Tehranipoor, M., Plusquellic, J.: Power Supply signal calibration techniques for improving detection resolution to hardware Trojans. In: 2008 IEEE/ACM International Conference on Computer-Aided Design, pp. 632–639. IEEE (2008) Rad, R.M., Wang, X., Tehranipoor, M., Plusquellic, J.: Power Supply signal calibration techniques for improving detection resolution to hardware Trojans. In: 2008 IEEE/ACM International Conference on Computer-Aided Design, pp. 632–639. IEEE (2008)
92.
Zurück zum Zitat Rai, D., Lach, J.: Performance of delay-based Trojan detection techniques under parameter variations. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 58–65 (2009) Rai, D., Lach, J.: Performance of delay-based Trojan detection techniques under parameter variations. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 58–65 (2009)
93.
Zurück zum Zitat Ranjani, R.S., Devi, M.N.: Golden-chip free power metric based hardware Trojan detection and diagnosis. Far East J. Electron. Commun. 17, 517–530 (2017)CrossRef Ranjani, R.S., Devi, M.N.: Golden-chip free power metric based hardware Trojan detection and diagnosis. Far East J. Electron. Commun. 17, 517–530 (2017)CrossRef
94.
Zurück zum Zitat Ranjani, R.S., Devi, M.N.: Malicious hardware detection and design for trust: an analysis. Elektrotehniski Vestnik 84(1/2), 7 (2017) Ranjani, R.S., Devi, M.N.: Malicious hardware detection and design for trust: an analysis. Elektrotehniski Vestnik 84(1/2), 7 (2017)
95.
Zurück zum Zitat Ranjani, R.S., Maneesh, P., Devi, M.N.: Golden chip free HT detection and diagnosis using power signature analysis. Presented at the 7th IEEE International Workshop on Reliability Aware System Design and Test (RASDAT) (2016) Ranjani, R.S., Maneesh, P., Devi, M.N.: Golden chip free HT detection and diagnosis using power signature analysis. Presented at the 7th IEEE International Workshop on Reliability Aware System Design and Test (RASDAT) (2016)
96.
Zurück zum Zitat Rathmair, M., Schupfer, F., Krieg, C.: Applied formal methods for hardware Trojan detection. In: 2014 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 169–172. IEEE (2014) Rathmair, M., Schupfer, F., Krieg, C.: Applied formal methods for hardware Trojan detection. In: 2014 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 169–172. IEEE (2014)
97.
Zurück zum Zitat Rilling, J., Graziano, D., Hitchcock, J., Meyer, T., Wang, X., Jones, P., Zambreno, J.: Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection. In: 2011 IEEE 29th International Conference on Computer Design (ICCD), pp. 289–292 (2011) Rilling, J., Graziano, D., Hitchcock, J., Meyer, T., Wang, X., Jones, P., Zambreno, J.: Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection. In: 2011 IEEE 29th International Conference on Computer Design (ICCD), pp. 289–292 (2011)
99.
Zurück zum Zitat Saha, S., Chakraborty, R.S., Nuthakki, S.S., Mukhopadhyay, D., et al.: Improved test pattern generation for hardware Trojan detection using genetic algorithm and Boolean satisfiability. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 577–596. Springer (2015) Saha, S., Chakraborty, R.S., Nuthakki, S.S., Mukhopadhyay, D., et al.: Improved test pattern generation for hardware Trojan detection using genetic algorithm and Boolean satisfiability. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 577–596. Springer (2015)
100.
Zurück zum Zitat Salmani, H., Tehranipoor, M., Karri, R.: On design vulnerability analysis and trust benchmarks development. In: 2013 IEEE 31st International Conference on Computer Design (ICCD), pp. 471–474. IEEE (2013) Salmani, H., Tehranipoor, M., Karri, R.: On design vulnerability analysis and trust benchmarks development. In: 2013 IEEE 31st International Conference on Computer Design (ICCD), pp. 471–474. IEEE (2013)
101.
Zurück zum Zitat Saran, T., Ranjani, R.S., Devi, M.N.: A region based fingerprinting for hardware Trojan detection and diagnosis. In: 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 166–172. IEEE (2017) Saran, T., Ranjani, R.S., Devi, M.N.: A region based fingerprinting for hardware Trojan detection and diagnosis. In: 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 166–172. IEEE (2017)
102.
Zurück zum Zitat Shakya, B., He, T., Salmani, H., Forte, D., Bhunia, S., Tehranipoor, M.: Benchmarking of hardware Trojans and maliciously affected circuits. J. Hardw. Syst. Secur. 1(1), 85–102 (2017)CrossRef Shakya, B., He, T., Salmani, H., Forte, D., Bhunia, S., Tehranipoor, M.: Benchmarking of hardware Trojans and maliciously affected circuits. J. Hardw. Syst. Secur. 1(1), 85–102 (2017)CrossRef
103.
Zurück zum Zitat Shi, Q., Vashistha, N., Lu, H., Shen, H., Tehranipoor, B., Woodard, D.L., Asadizanjani, N.: Golden gates: a new hybrid approach for rapid hardware Trojan detection using testing and imaging. In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 61–71 (2019). https://doi.org/10.1109/HST.2019.8741031 Shi, Q., Vashistha, N., Lu, H., Shen, H., Tehranipoor, B., Woodard, D.L., Asadizanjani, N.: Golden gates: a new hybrid approach for rapid hardware Trojan detection using testing and imaging. In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 61–71 (2019). https://​doi.​org/​10.​1109/​HST.​2019.​8741031
105.
Zurück zum Zitat Stern, A., Mehta, D., Tajik, S., Guin, U., Farahmandi, F., Tehranipoor, M.: SPARTA-COTS: a laser probing approach for sequential Trojan detection in COTS integrated circuits. In: 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), pp. 1–6 (2020). https://doi.org/10.1109/PAINE49178.2020.9337728 Stern, A., Mehta, D., Tajik, S., Guin, U., Farahmandi, F., Tehranipoor, M.: SPARTA-COTS: a laser probing approach for sequential Trojan detection in COTS integrated circuits. In: 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), pp. 1–6 (2020). https://​doi.​org/​10.​1109/​PAINE49178.​2020.​9337728
106.
Zurück zum Zitat Söll, O., Korak, T., Muehlberghuber, M., Hutter, M.: EM-based detection of hardware Trojans on FPGAs. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 84–87 (2014) Söll, O., Korak, T., Muehlberghuber, M., Hutter, M.: EM-based detection of hardware Trojans on FPGAs. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 84–87 (2014)
107.
Zurück zum Zitat Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)CrossRef Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)CrossRef
109.
110.
Zurück zum Zitat Voyiatzis, A.G., Stefanidis, K.G., Kitsos, P.: Efficient triggering of Trojan hardware logic. In: 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS), pp. 1–6. IEEE (2016) Voyiatzis, A.G., Stefanidis, K.G., Kitsos, P.: Efficient triggering of Trojan hardware logic. In: 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS), pp. 1–6. IEEE (2016)
111.
Zurück zum Zitat Waksman, A., Suozzo, M., Sethumadhavan, S.: FANCI: identification of stealthy malicious logic using Boolean functional analysis. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 697–708 (2013) Waksman, A., Suozzo, M., Sethumadhavan, S.: FANCI: identification of stealthy malicious logic using Boolean functional analysis. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 697–708 (2013)
112.
Zurück zum Zitat Wang, X., Salmani, H., Tehranipoor, M., Plusquellic, J.: Hardware Trojan detection and isolation using current integration and localized current analysis. In: 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, pp. 87–95 (2008) Wang, X., Salmani, H., Tehranipoor, M., Plusquellic, J.: Hardware Trojan detection and isolation using current integration and localized current analysis. In: 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, pp. 87–95 (2008)
113.
Zurück zum Zitat Wei, S., Potkonjak, M.: Scalable consistency-based hardware Trojan detection and diagnosis. In: 2011 5th International Conference on Network and System Security, pp. 176–183 (2011) Wei, S., Potkonjak, M.: Scalable consistency-based hardware Trojan detection and diagnosis. In: 2011 5th International Conference on Network and System Security, pp. 176–183 (2011)
114.
Zurück zum Zitat Wei, S., Potkonjak, M.: Scalable hardware Trojan diagnosis. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20(6), 1049–1057 (2012)CrossRef Wei, S., Potkonjak, M.: Scalable hardware Trojan diagnosis. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20(6), 1049–1057 (2012)CrossRef
115.
Zurück zum Zitat Wei, S., Potkonjak, M.: Self-consistency and consistency-based detection and diagnosis of malicious circuitry. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 22(9), 1845–1853 (2014)CrossRef Wei, S., Potkonjak, M.: Self-consistency and consistency-based detection and diagnosis of malicious circuitry. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 22(9), 1845–1853 (2014)CrossRef
117.
Zurück zum Zitat Wilcox, I., Saqib, F., Plusquellic, J.: GDS-II Trojan detection using multiple supply pad VDD and GND IDDQs in ASIC functional units. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 144–150 (2015) Wilcox, I., Saqib, F., Plusquellic, J.: GDS-II Trojan detection using multiple supply pad VDD and GND IDDQs in ASIC functional units. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 144–150 (2015)
118.
Zurück zum Zitat Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: 2008 Design, Automation and Test in Europe, pp. 1362–1365. IEEE (2008) Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: 2008 Design, Automation and Test in Europe, pp. 1362–1365. IEEE (2008)
119.
Zurück zum Zitat Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1362–1365. ACM (2008) Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1362–1365. ACM (2008)
121.
Zurück zum Zitat Xiao, K., Forte, D., Jin, Y., Karri, R., Bhunia, S., Tehranipoor, M.: Hardware Trojans: lessons learned after one decade of research. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 22(1), 1–23 (2016)CrossRef Xiao, K., Forte, D., Jin, Y., Karri, R., Bhunia, S., Tehranipoor, M.: Hardware Trojans: lessons learned after one decade of research. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 22(1), 1–23 (2016)CrossRef
122.
Zurück zum Zitat Xue, H., Ren, S.: Self-reference-based hardware Trojan detection. IEEE Trans. Semicond. Manuf. 31(1), 2–11 (2018)CrossRef Xue, H., Ren, S.: Self-reference-based hardware Trojan detection. IEEE Trans. Semicond. Manuf. 31(1), 2–11 (2018)CrossRef
123.
Zurück zum Zitat Xue, M., Bian, R., Wang, J., Liu, W.: A co-training based hardware Trojan detection technique by exploiting unlabeled ICs and inaccurate simulation models. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1452–1457 (2018) Xue, M., Bian, R., Wang, J., Liu, W.: A co-training based hardware Trojan detection technique by exploiting unlabeled ICs and inaccurate simulation models. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1452–1457 (2018)
124.
Zurück zum Zitat Xue, M., Bian, R., Wang, J., Liu, W.: Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs. IET Comput. Dig. Tech. 13(4), 348–359 (2019)CrossRef Xue, M., Bian, R., Wang, J., Liu, W.: Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs. IET Comput. Dig. Tech. 13(4), 348–359 (2019)CrossRef
125.
Zurück zum Zitat Xue, M., Wang, J., Hu, A.: An enhanced classification-based golden chips-free hardware Trojan detection technique. In: 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp. 1–6 (2016) Xue, M., Wang, J., Hu, A.: An enhanced classification-based golden chips-free hardware Trojan detection technique. In: 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp. 1–6 (2016)
127.
Zurück zum Zitat Yier Jin, Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 51–57 (2008) Yier Jin, Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 51–57 (2008)
128.
Zurück zum Zitat Yoshimizu, N.: Hardware Trojan detection by symmetry breaking in path delays. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 107–111 (2014) Yoshimizu, N.: Hardware Trojan detection by symmetry breaking in path delays. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 107–111 (2014)
129.
Zurück zum Zitat Zhang, J., Yu, H., Xu, Q.: HTOutlier: hardware Trojan detection with side-channel signature outlier identification. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 55–58 (2012) Zhang, J., Yu, H., Xu, Q.: HTOutlier: hardware Trojan detection with side-channel signature outlier identification. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 55–58 (2012)
130.
Zurück zum Zitat Zhang, X., Tehranipoor, M.: RON: an on-chip ring oscillator network for hardware Trojan detection. In: 2011 Design, Automation Test in Europe, pp. 1–6 (2011) Zhang, X., Tehranipoor, M.: RON: an on-chip ring oscillator network for hardware Trojan detection. In: 2011 Design, Automation Test in Europe, pp. 1–6 (2011)
131.
Zurück zum Zitat Zhang, X., Salmani, H.: Integrated circuit authentication: hardware Trojans and counterfeit detection (2014) Zhang, X., Salmani, H.: Integrated circuit authentication: hardware Trojans and counterfeit detection (2014)
132.
Zurück zum Zitat Zhang, X., Tehranipoor, M.: Case study: detecting hardware Trojans in third-party digital IP cores. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 67–70. IEEE (2011) Zhang, X., Tehranipoor, M.: Case study: detecting hardware Trojans in third-party digital IP cores. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 67–70. IEEE (2011)
133.
Zurück zum Zitat Zheng, Y., Yang, S., Bhunia, S.: SeMIA: self-similarity-based IC integrity analysis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1), 37–48 (2016)CrossRef Zheng, Y., Yang, S., Bhunia, S.: SeMIA: self-similarity-based IC integrity analysis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1), 37–48 (2016)CrossRef
134.
Zurück zum Zitat Zhou, B., Adato, R., Zangeneh, M., Yang, T., Uyar, A., Goldberg, B., Unlu, S., Joshi, A.: Detecting hardware Trojans using backside optical imaging of embedded watermarks. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6 (2015). https://doi.org/10.1145/2744769.2744822 Zhou, B., Adato, R., Zangeneh, M., Yang, T., Uyar, A., Goldberg, B., Unlu, S., Joshi, A.: Detecting hardware Trojans using backside optical imaging of embedded watermarks. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6 (2015). https://​doi.​org/​10.​1145/​2744769.​2744822
135.
Metadaten
Titel
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
verfasst von
Rijoy Mukherjee
Sree Ranjani Rajendran
Rajat Subhra Chakraborty
Publikationsdatum
16.07.2022
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 4/2022
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-022-00295-w

Weitere Artikel der Ausgabe 4/2022

Journal of Cryptographic Engineering 4/2022 Zur Ausgabe

Premium Partner