Skip to main content
Top

2018 | OriginalPaper | Chapter

Hardware Trojans: An Austere Menace Ahead

Authors : Anupam Tiwari, Chetan Soni

Published in: Cyber Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Hardware Trojans, a relatively unheard threat viz-a-viz the typical software-based malwares and virus attacks that keep betiding across is being realized gradually by the IT security domain including the users, the IT Security professionals, and the corporate sector who all of a sudden discern the immense threat they might already be living in with. A distinctive dormant Hardware Trojan threat can be so flagitious that the victim does not even know if he is effectuated when he might already be. Hardware Trojans are evolving threats that can shake the roots of any set and constituted government or corporate giant for that matter. Unlike Software virus/malware threats, Hardware Trojans are pertinacious in nature. This paper brings out an overview of these threats including classifications, mechanisms they work on and the current set of countermeasures being researched upon.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Mitra S, Wong HSP, Wong S (2015) Stopping Hardware Trojans in their tracks Mitra S, Wong HSP, Wong S (2015) Stopping Hardware Trojans in their tracks
3.
go back to reference Bhunia S (2014) Hardware trojan attacks: threat analaysis and counter measures Bhunia S (2014) Hardware trojan attacks: threat analaysis and counter measures
4.
go back to reference Karri R (2010) Trustworthy hardware: Identifying and classifying Hardware Trojans. IEEE Comput 43(10) Karri R (2010) Trustworthy hardware: Identifying and classifying Hardware Trojans. IEEE Comput 43(10)
5.
go back to reference Wang X, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proceedings of the 2008 IEEE international workshop on hardware-oriented security and trust, Washington Wang X, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proceedings of the 2008 IEEE international workshop on hardware-oriented security and trust, Washington
6.
go back to reference Zhang J (2014) DeTrust- defeating hardware trust verification with stealthy implicitly-triggered Hardware Trojans Zhang J (2014) DeTrust- defeating hardware trust verification with stealthy implicitly-triggered Hardware Trojans
7.
go back to reference Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat
8.
go back to reference Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat, p 47, Para 5 Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat, p 47, Para 5
9.
go back to reference Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat, p 49, Para 5.3 Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat, p 49, Para 5.3
10.
go back to reference Aliyu A, Bello A (2014) Hardware Trojan model for attack and detection techniques Aliyu A, Bello A (2014) Hardware Trojan model for attack and detection techniques
11.
go back to reference Rad R, Plusquellic J, Tehranipoor M (2010) A sensitivity analysis of power signal methods for detecting Hardware Trojans under real process and environmental conditions Rad R, Plusquellic J, Tehranipoor M (2010) A sensitivity analysis of power signal methods for detecting Hardware Trojans under real process and environmental conditions
12.
go back to reference Wu TF, Wong HSP, Wong S, Mitra S (2015) TPAD-hardware trojan prevention and detection for trusted integrated circuits Wu TF, Wong HSP, Wong S, Mitra S (2015) TPAD-hardware trojan prevention and detection for trusted integrated circuits
13.
go back to reference Lin L, Burleson W (2009) MOLES—malicious off-chip leakage enabled by side-channels Lin L, Burleson W (2009) MOLES—malicious off-chip leakage enabled by side-channels
15.
go back to reference Hardware Malware book By Edgar Weippl (2013) Adrian Dabrowski, Heidelinde Hobel, p 67, para 4.2 Hardware Malware book By Edgar Weippl (2013) Adrian Dabrowski, Heidelinde Hobel, p 67, para 4.2
16.
go back to reference King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y (2008) Designing and implementing malicious hardware. In: Proceedings of the first USENIX workshop on large-scale exploits and emergent threats(LEET) King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y (2008) Designing and implementing malicious hardware. In: Proceedings of the first USENIX workshop on large-scale exploits and emergent threats(LEET)
17.
go back to reference Adee S (2008) The hunt for the kill switch. IEEE Spect 45(5):34–39 Adee S (2008) The hunt for the kill switch. IEEE Spect 45(5):34–39
18.
go back to reference Skorobogatov S (2012) Breakthrough silicon scanning discovers backdoor in military chip. In: Cryptographic hardware and embedded systems (CHES’12), vol 7428. Springer, Berlin, pp 23–40 Skorobogatov S (2012) Breakthrough silicon scanning discovers backdoor in military chip. In: Cryptographic hardware and embedded systems (CHES’12), vol 7428. Springer, Berlin, pp 23–40
21.
go back to reference Shahrjerdi D, Rajendran J (2014) Shielding and securing integrated circuits with sensors Shahrjerdi D, Rajendran J (2014) Shielding and securing integrated circuits with sensors
22.
go back to reference Hardware Malware book By Edgar Weippl (2013) Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, p 67, para 4.2 Hardware Malware book By Edgar Weippl (2013) Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, p 67, para 4.2
23.
go back to reference Aliyu A, Bello A (2014) Hardware Trojan model for attack and detection techniques Aliyu A, Bello A (2014) Hardware Trojan model for attack and detection techniques
Metadata
Title
Hardware Trojans: An Austere Menace Ahead
Authors
Anupam Tiwari
Chetan Soni
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_34

Premium Partner