Skip to main content
Top

2018 | OriginalPaper | Chapter

2. Circuit Vulnerabilities to Hardware Trojans at the Register-Transfer Level

Author : Hassan Salmani

Published in: Trusted Digital Circuits

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Realized by modifying design implementation, hardware Trojans can interfere with any step of the design process. A hardware Trojan may undermine a system’s confidentiality by leaking secret information or can abrogate system availability by performing a malfunction. Soft third-party intellectual properties (IPs) are extensively used in high-level implementation, and they are highly vulnerable to hardware Trojan insertion. Therefore, there is a need for systematic approaches to assess vulnerabilities of a circuit to hardware Trojan insertion and to identify potential hardware Trojan locations at the register-transfer level.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference H. Salmani, M. Tehranipoor, Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level, in 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) (2013), pp. 190–195 H. Salmani, M. Tehranipoor, Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level, in 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) (2013), pp. 190–195
2.
go back to reference W.H. Harrison, Compiler analysis of the value ranges for variables. IEEE Trans. Softw. Eng. 3(3), 243–250 (1977) W.H. Harrison, Compiler analysis of the value ranges for variables. IEEE Trans. Softw. Eng. 3(3), 243–250 (1977)
5.
go back to reference M. Dale, Verification crisis: managing complexity in SoC designs. https://www.eetimes.com/document.asp?doc_id=1215507. Accessed 22 Jan 2018 M. Dale, Verification crisis: managing complexity in SoC designs. https://​www.​eetimes.​com/​document.​asp?​doc_​id=​1215507. Accessed 22 Jan 2018
6.
go back to reference N. Fern, S. Kulkarni, K.-T.T. Cheng, Hardware Trojans hidden in RTL don’t cares – automated insertion and prevention methodologies, in International Test Conference (ITC), October 2015 N. Fern, S. Kulkarni, K.-T.T. Cheng, Hardware Trojans hidden in RTL don’t cares – automated insertion and prevention methodologies, in International Test Conference (ITC), October 2015
7.
go back to reference N. Fern, K.-T.T. Cheng, Verification and trust for unspecified IP functionality, in Hardware IP Security and Trust (Springer, 2017) N. Fern, K.-T.T. Cheng, Verification and trust for unspecified IP functionality, in Hardware IP Security and Trust (Springer, 2017)
8.
go back to reference N. Fern, I. San, K.-T.T. Cheng, Detecting hardware Trojans in unspecified functionality through solving satisfiability problems, in Asia and South Pacific Design Automation Conference (ASP-DAC), January 2017 N. Fern, I. San, K.-T.T. Cheng, Detecting hardware Trojans in unspecified functionality through solving satisfiability problems, in Asia and South Pacific Design Automation Conference (ASP-DAC), January 2017
9.
go back to reference C. Rebeiro, D. Mukhopadhyay, High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms (Springer, Berlin, 2008), pp. 376–388 C. Rebeiro, D. Mukhopadhyay, High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms (Springer, Berlin, 2008), pp. 376–388
10.
go back to reference X. Zhang, M. Tehranipoor, Case study: detecting hardware Trojans in third-party digital IP cores, in 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2011), pp. 67–70 X. Zhang, M. Tehranipoor, Case study: detecting hardware Trojans in third-party digital IP cores, in 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2011), pp. 67–70
Metadata
Title
Circuit Vulnerabilities to Hardware Trojans at the Register-Transfer Level
Author
Hassan Salmani
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-79081-7_2