The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.07 - July (2011 vol.44)
pp: 66-74
Mohammad Tehranipoor , University of Connecticut
Hassan Salmani , University of Connecticut
Xuehui Zhang , University of Connecticut
Xiaoxiao Wang , University of Connecticut
Ramesh Karri , Polytechnic Institute of New York University
Jeyavijayan Rajendran , Polytechnic Institute of New York University
Kurt Rosenfeld , Polytechnic Institute of New York University
ABSTRACT
Globalization of the semiconductor industry and associated supply chains have made integrated circuits increasingly vulnerable to Trojans. Researchers must expand efforts to verify trust in intellectual property cores and ICs.
INDEX TERMS
Hardware Trojans, Integrated circuits, Intellectual property, Side-channel signal analysis
CITATION
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, Xiaoxiao Wang, Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, "Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges", Computer, vol.44, no. 7, pp. 66-74, July 2011, doi:10.1109/MC.2010.369
REFERENCES
1. DARPA TRUST in Integrated Circuits program, www.darpa.mil/Our_Work/MTO/ProgramsTrusted_Integrated_Circuits_%28TRUST%29.aspx .
2. J.I. Lieberman, "National Security Aspects of the Global Migration of the U.S. Semiconductor Industry," June 2003, white paper, US Senate Armed Services Committee; www.ece.unm.edu/~jimp/HOST/govt_reportsliberman_semiconductor.pdf .
3. S. Adee, "The Hunt for the Kill Switch," IEEE Spectrum, May 2008, pp. 34-39.
4. "Innovation at Risk: Intellectual Property Challenges and Opportunities," white paper, Semiconductor Equipment and Materials Int'l, 2008.
5. R. Karri et al., "Trustworthy Hardware: Identifying and Classifying Hardware Trojans," Computer, Oct. 2010, pp. 39-46.
6. VSI Alliance, VSI Alliance Architecture Document: Version 1.0, 1997.
7. X. Zhang and M. Tehranipoor, "Case Study: Detecting Hardware Trojans in Third-Party Digital IP Cores," to appear in Proc. 2011 IEEE Int'l Symp. Hardware-Oriented Security and Trust (HOST 11), IEEE CS Press, 2011.
8. M.L. Bushnell and V.D. Agrawal, Essentials of Electronic Testing for Digital Memory & Mixed-Signal VLSI Circuits, Springer, 2000.
9. M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design & Test of Computers, Jan. 2010, pp. 10-25.
10. D. Agrawal et al., "Trojan Detection Using IC Fingerprinting," Proc. 2007 IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, 2007, pp. 296-310.
11. X. Wang et al., "Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis," Proc. 2008 IEEE Int'l Symp. Defect and Tolerance of VLSI Systems (DFT 08), IEEE CS Press, 2008, pp. 87-95.
12. Y. Alkabani and F. Koushanfar, "Consistency-Based Characterization for IC Trojan Detection," Proc. 2009 Int'l Conf. Computer-Aided Design (ICCAD 09), ACM Press, 2009, pp. 123-127.
13. M. Potkonjak et al., "Hardware Trojan Horse Detection Using Gate-Level Characterization," Proc. 46th Ann. Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 688-693.
14. J. Li and J. Lach, "At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection," Proc. 2008 IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE CS Press, 2008, pp. 8-14.
15. D. Rai and J. Lach, "Performance of Delay-Based Trojan Detection Techniques under Parameter Variations," Proc. 2009 IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE CS Press, 2009, pp. 58-65.
16. Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," Proc. 2008 IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE CS Press, 2008, pp. 51-57.
17. X. Wang, M. Tehranipoor, and J. Plusquellic, "Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions," Proc. 2008 Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE CS Press, 2008, pp. 15-19.
18. S. Jha and S.K. Jha, "Randomization-Based Probabilistic Approach to Detect Trojan Circuits," Proc. 2008 11th IEEE Symp. High Assurance Systems Eng. (HASE 08), IEEE CS Press, 2008, pp. 117-124.
19. F. Wolff et al., "Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme," Proc. Conf. Design, Automation and Test in Europe (DATE 08), ACM Press, 2008, pp. 1362-1365.
20. M. Banga et al., "Guided Test Generation for Isolation and Detection of Embedded Trojans in ICs," Proc. 18th ACM Great Lakes Symp. VLSI (GLSVLSI 08), ACM Press, 2008, pp. 363-366.
21. M. Banga and M.S. Hsiao, "A Region-Based Approach for the Identification of Hardware Trojans," Proc. 2008 IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE CS Press, 2008, pp. 40-47.
22. M. Banga and M.S. Hsiao, "A Novel Sustained Vector Technique for the Detection of Hardware Trojans," Proc. 22nd Int'l Conf. VLSI Design (VLSID 09), IEEE CS Press, 2009, pp. 327-332.
23. H. Salmani, M. Tehranipoor, and J. Plusquellic, "New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time," Proc. 2009 IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE CS Press, 2009, pp. 66-73.
24. H. Salmani and M. Tehranipoor, "A Layout-Aware Approach for Improving Localized Switching to Detect Hardware Trojans in Integrated Circuits," Proc. 2010 IEEE Int'l Workshop Information Forensics and Security (WIFS 10), IEEE Press, 2010; doi: 10.1109/WIFS.2010.5711438.
25. J. Rajendran et al., "Reconfiguration of Functional Logic into Trojan Detecting Ring Oscillators and Test-for-Trust Cost Analysis," to appear in Proc. 29th IEEE VLSI Test Symp. (VTS 11), IEEE CS Press, 2011.
35 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool