Hardware Trojans in Chips: A Survey for Detection and Prevention.

Sensors (Basel)

Key Laboratory of Spatial Data Mining & Information Sharing, College of Mathematics and Computer Science, Ministry of Education, Fuzhou University, Fuzhou 350116, China.

Published: September 2020

Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570641PMC
http://dx.doi.org/10.3390/s20185165DOI Listing

Publication Analysis

Top Keywords

hardware trojans
8
hardware
4
trojans chips
4
chips survey
4
survey detection
4
detection prevention
4
prevention diverse
4
diverse wide-range
4
wide-range applications
4
applications integrated
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!