This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
October 2010 (vol. 43 no. 10)
pp. 39-46
Ramesh Karri, Polytechnic Institute of New York University
Jeyavijayan Rajendran, Polytechnic Institute of New York University
Mohammad Tehranipoor, University of Connecticut
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.

1. Defense Science Board, "Defense Science Board Task Force on High Performance Microchip Supply," Feb. 2005; www.cra.org/govaffairs/images2005-02-HPMS_Report_Final.pdf .
2. J.H. Follett, "CRN Cisco Channel at Center of FBI Raid on Counterfeit Gear,"12 May 2008, CRN.com; www.crn.com/networking207602683.
3. X. Wang, M. Tehranipoor, and J. Plusquellic, "Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE Press, 2008, pp. 15-19.
4. M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design & Test, Jan./Feb., 2010, pp. 10-25.
5. Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE Press, 2008, pp. 51-57.
6. M. Potkonjak et al., "Hardware Trojan Horse Detection Using Gate-Level Characterization," Proc. 46th Ann. Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 688-693.
7. J. Rajendran et al., "Towards a Comprehensive and Systematic Classification of Hardware Trojans," Proc. IEEE Int'l Symp. Circuits and Systems (ISCAS10), IEEE Press, 2010, pp. 1871-1874.
8. S. Adee, "The Hunt for the Kill Switch," IEEE Spectrum, May 2008, pp. 34-39.
9. J.A. Roy, F. Koushanfar, and I.L. Markov, "Extended Abstract: Circuit CAD Tools as a Security Threat," Proc. IEEE Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE Press, 2008, pp. 65-66.
1. Y.C. Yeh, "Triple-Triple Redundant 777 Primary Flight Computer," Proc. 1996 IEEE Aerospace Applications Conf., vol. 1, IEEE Press, 1996, pp. 293-307.
2. R. Anderson and M. Kuhn, "Tamper Resistance: A Cautionary Note," Proc. 2nd Usenix Workshop Electronic Commerce, vol. 2, Usenix Assoc., 1996, pp. 1-11.
3. J.G. Dyer et al., "Building the IBM 4758 Secure Coprocessor," Computer, Oct. 2001, pp. 57-66.
4. P.C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. 19th Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto 99), LNCS 1666, Springer-Verlag, 1999, pp. 388-397.
5. H. Bar-El et al., "The Sorcerer's Apprentice Guide to Fault Attacks," Proc. IEEE, Feb. 2006, pp. 370-382.
6. G. Qu and M. Potkonjak, Intellectual Property Protection in VLSI Design: Theory and Practice, Kluwer Academic, 2003.
7. S. Devadas et al., "Design and Implementation of PUF-Based 'Unclonable' RFID ICs for Anti-Counterfeiting and Security Applications," Proc. IEEE Int'l Conf. RFID, IEEE Press, 2008, pp. 58-64.

Index Terms:
Hardware security and trust, Hardware Trojans, Design and test, Security and privacy
Citation:
Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, Mohammad Tehranipoor, "Trustworthy Hardware: Identifying and Classifying Hardware Trojans," Computer, vol. 43, no. 10, pp. 39-46, Oct. 2010, doi:10.1109/MC.2010.299
Usage of this product signifies your acceptance of the Terms of Use.