The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - October (2010 vol.43)
pp: 39-46
Ramesh Karri , Polytechnic Institute of New York University
Jeyavijayan Rajendran , Polytechnic Institute of New York University
Mohammad Tehranipoor , University of Connecticut
ABSTRACT
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
INDEX TERMS
Hardware security and trust, Hardware Trojans, Design and test, Security and privacy
CITATION
Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, Mohammad Tehranipoor, "Trustworthy Hardware: Identifying and Classifying Hardware Trojans", Computer, vol.43, no. 10, pp. 39-46, October 2010, doi:10.1109/MC.2010.299
REFERENCES
1. Defense Science Board, "Defense Science Board Task Force on High Performance Microchip Supply," Feb. 2005; www.cra.org/govaffairs/images2005-02-HPMS_Report_Final.pdf .
2. J.H. Follett, "CRN Cisco Channel at Center of FBI Raid on Counterfeit Gear,"12 May 2008, CRN.com; www.crn.com/networking207602683.
3. X. Wang, M. Tehranipoor, and J. Plusquellic, "Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE Press, 2008, pp. 15-19.
4. M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design & Test, Jan./Feb., 2010, pp. 10-25.
5. Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE Press, 2008, pp. 51-57.
6. M. Potkonjak et al., "Hardware Trojan Horse Detection Using Gate-Level Characterization," Proc. 46th Ann. Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 688-693.
7. J. Rajendran et al., "Towards a Comprehensive and Systematic Classification of Hardware Trojans," Proc. IEEE Int'l Symp. Circuits and Systems (ISCAS10), IEEE Press, 2010, pp. 1871-1874.
8. S. Adee, "The Hunt for the Kill Switch," IEEE Spectrum, May 2008, pp. 34-39.
9. J.A. Roy, F. Koushanfar, and I.L. Markov, "Extended Abstract: Circuit CAD Tools as a Security Threat," Proc. IEEE Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE Press, 2008, pp. 65-66.
37 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool