TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS

被引:332
作者
Karri, Ramesh [1 ]
Rajendran, Jeyavijayan [1 ]
Rosenfeld, Kurt
Tehranipoor, Mohammad [2 ]
机构
[1] NYU, Polytech Inst, Dept Elect & Comp Engn, New York, NY 10003 USA
[2] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
基金
美国国家科学基金会;
关键词
Design and test; Hardware security and trust; Hardware Trojans; Security and privacy;
D O I
10.1109/MC.2010.299
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
引用
收藏
页码:39 / 46
页数:8
相关论文
共 16 条
[1]   The hunt for the kill switch [J].
Adee, Sally .
IEEE SPECTRUM, 2008, 45 (05) :34-39
[2]  
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[3]  
[Anonymous], 2003, INTELLECTUAL PROPERT
[4]   The sorcerer's apprentice guide to fault attacks [J].
Bar-El, H ;
Choukri, H ;
Naccache, D ;
Tunstall, M ;
Whelan, C .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :370-382
[5]  
Defense Science Board, 2005, DEF SCI BOARD TASK F
[6]   Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications [J].
Devadas, Srinivas ;
Suh, Edward ;
Paral, Sid ;
Sowell, Richard ;
Ziola, Tom ;
Khandelwal, Vivek .
2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, :58-+
[7]   Building the IBM 4758 secure coprocessor [J].
Dyer, JG ;
Lindemann, M ;
Perez, R ;
Sailer, R ;
van Doorn, L ;
Smith, SW ;
Weingart, S .
COMPUTER, 2001, 34 (10) :57-+
[8]  
FOLLETT JH, CRN CISCO CHANNEL CT
[9]  
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
[10]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388