메뉴 건너뛰기




Volumn , Issue , 2009, Pages 166-171

Hardware trojan: Threats and emerging solutions

Author keywords

Design for security; Hardware trojan

Indexed keywords

CONVENTIONAL DESIGN; DETECTION TECHNIQUE; FUNCTIONAL BEHAVIORS; MANUFACTURING TESTING; OPERATING MODES; RESEARCH NEEDS; SAFETY CRITICAL APPLICATIONS; SECURITY HARDWARE; TROJANS;

EID: 76649097322     PISSN: 15526674     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HLDVT.2009.5340158     Document Type: Conference Paper
Times cited : (382)

References (38)
  • 2
    • 62649134605 scopus 로고    scopus 로고
    • Defense Science Board, Online
    • Defense Science Board, "Task force on high performance microchip supply", 2005. [Online]. Available: http://www.acq.osd.mil/dsb/reports/ 200502HPMSReportFinal.pdf.
    • (2005) Task Force on High Performance Microchip Supply
  • 4
    • 80051982002 scopus 로고    scopus 로고
    • Australian Government DoD-DSTO, Online
    • Australian Government DoD-DSTO, "Towards Countering the Rise of the Silicon Trojan", 2008. [Online]. Available: http://dspace.dsto.defence. gov.au/dspace/bitstream/1947/9736/l/DSTO-TR-2220\%20PR.pdf.
    • (2008) Towards Countering the Rise of the Silicon Trojan
  • 5
    • 44449083733 scopus 로고    scopus 로고
    • The hunt for the kill switch
    • May
    • S. Adee, "The Hunt for the Kill Switch", IEEE Spectrum, May 2008.
    • (2008) IEEE Spectrum
    • Adee, S.1
  • 6
    • 76649104120 scopus 로고    scopus 로고
    • Integrated circuit security - New threats and solutions
    • M. Abramovici and P. Bradley, "Integrated Circuit Security - New Threats and Solutions", CSIIR Workshop, 2009.
    • (2009) CSIIR Workshop
    • Abramovici, M.1    Bradley, P.2
  • 7
    • 49749105556 scopus 로고    scopus 로고
    • Towards trojan-free trusted ICs: Problem analysis and detection scheme
    • F. Wolff et al., "Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme", DATE, 2008.
    • (2008) DATE
    • Wolff, F.1
  • 8
    • 51849111151 scopus 로고    scopus 로고
    • Detecting malicious inclusions in secure hardware: Challenges and solutions
    • X. Wang, M. Tehranipoor and J. Plusquellic, "Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions", HOST, 2008.
    • (2008) HOST
    • Wang, X.1    Tehranipoor, M.2    Plusquellic, J.3
  • 9
    • 84894124907 scopus 로고    scopus 로고
    • Hardware trojan designs on BASYS FPGA board (Virginia tech)
    • Online
    • Z. Chen et al., "Hardware Trojan Designs on BASYS FPGA Board (Virginia Tech)", CSAW Embedded System Challenge, 2008. [Online]. Available: http://isis.poly.edu/~vikram/vt.pdf.
    • (2008) CSAW Embedded System Challenge
    • Chen, Z.1
  • 10
    • 76649104443 scopus 로고    scopus 로고
    • Embedded systems challenge (Iowa State University)
    • Online.
    • A. Baumgarten et al., "Embedded Systems Challenge (Iowa State University)", CSAW Embedded System Challenge, 2008. [Online]. Available: http://isis.poly.edu/~vikram/iowa-state.pdf.
    • (2008) CSAW Embedded System Challenge
    • Baumgarten, A.1
  • 11
    • 76649111140 scopus 로고    scopus 로고
    • Yale University, CSAW Embedded System Challenge, Online
    • Y. Jin and N. Kupp, "CSAW 2008 Team Report (Yale University)", CSAW Embedded System Challenge, 2008. [Online], Available: http://isis. poly.edu/~vikram/yale.pdf.
    • (2008) CSAW 2008 Team Report
    • Jin, Y.1    Kupp, N.2
  • 12
    • 76349087817 scopus 로고    scopus 로고
    • Security against hardware trojan through a novel application of design obfuscation
    • R.S. Chakraborty and S. Bhunia, "Security against Hardware Trojan through a Novel Application of Design Obfuscation", ICCAD, 2009.
    • (2009) ICCAD
    • Chakraborty, R.S.1    Bhunia, S.2
  • 13
    • 51849089785 scopus 로고    scopus 로고
    • On-demand transparency for improving hardware trojan detectability
    • R.S. Chakraborty, S. Paul and S. Bhunia, "On-Demand Transparency for Improving Hardware Trojan Detectability", HOST, 2008.
    • (2008) HOST
    • Chakraborty, R.S.1    Paul, S.2    Bhunia, S.3
  • 14
    • 51849090209 scopus 로고    scopus 로고
    • Trustworthy system security through 3-D integrated hardware
    • T. Huffmire et al., "Trustworthy System Security through 3-D Integrated Hardware", HOST, 2008.
    • (2008) HOST
    • Huffmire, T.1
  • 15
    • 70449127255 scopus 로고    scopus 로고
    • VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs
    • M. Banga and M.S. Hsiao, "VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs", HOST, 2009.
    • (2009) HOST
    • Banga, M.1    Hsiao, M.S.2
  • 16
    • 51849099113 scopus 로고    scopus 로고
    • At-speed delay characterization for IC authentication and trojan horse detection
    • J. Li and J. Lach, "At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection", HOST, 2008.
    • (2008) HOST
    • Li, J.1    Lach, J.2
  • 18
    • 70449127253 scopus 로고    scopus 로고
    • Dynamic evaluation of hardware trust
    • D. Mclntyre et al., "Dynamic Evaluation of Hardware Trust", HOST, 2009.
    • (2009) HOST
    • Mclntyre, D.1
  • 19
    • 70449112832 scopus 로고    scopus 로고
    • OS support for detecting trojan circuit attacks
    • G. Bloom, B. Narahari and R. Slmha, "OS Support for Detecting Trojan Circuit Attacks", HOST, 2009.
    • (2009) HOST
    • Bloom, G.1    Narahari, B.2    Slmha, R.3
  • 20
    • 79952530026 scopus 로고    scopus 로고
    • MERO: A statistical approach for hardware trojan detection
    • R.S. Chakraborty et al., "MERO: A Statistical Approach for Hardware Trojan Detection", CHES Workshop, 2009.
    • (2009) CHES Workshop
    • Chakraborty, R.S.1
  • 23
    • 51849084404 scopus 로고    scopus 로고
    • Sensitivity analysis to hardware trojans using power supply transient signals
    • R.M. Rad, J. Plusquellic and M. Tehranipoor, "Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals", HOST, 2008.
    • (2008) HOST
    • Rad, R.M.1    Plusquellic, J.2    Tehranipoor, M.3
  • 24
    • 51849095999 scopus 로고    scopus 로고
    • Hardware trojan detection using path delay fingerprint
    • Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint", HOST, 2008.
    • (2008) HOST
    • Jin, Y.1    Makris, Y.2
  • 25
    • 70449094859 scopus 로고    scopus 로고
    • Performance of delay-based trojan detection techniques under parameter variations
    • D. Rai and J. Lach, "Performance of Delay-Based Trojan Detection Techniques under Parameter Variations", HOST, 2009.
    • (2009) HOST
    • Rai, D.1    Lach, J.2
  • 26
    • 70350733802 scopus 로고    scopus 로고
    • Hardware trojan horse detection using gatelevel characterization
    • M. Potkonjak et al., "Hardware Trojan Horse Detection Using GateLevel Characterization", DAC, 2009.
    • (2009) DAC
    • Potkonjak, M.1
  • 27
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware trojans
    • M. Banga and M.S. Hsiao, "A Region Based Approach for the Identification of Hardware Trojans", HOST, 2008.
    • (2008) HOST
    • Banga, M.1    Hsiao, M.S.2
  • 28
    • 62949192896 scopus 로고    scopus 로고
    • A novel sustained vector technique for the detection of hardware trojans
    • M. Banga and M.S. Hsiao, "A Novel Sustained Vector Technique for the Detection of Hardware Trojans", VLSI Design, 2009.
    • (2009) VLSI Design
    • Banga, M.1    Hsiao, M.S.2
  • 29
    • 70449123838 scopus 로고    scopus 로고
    • New design strategy for improving hardware trojan detection and reducing trojan activation time
    • H. Salmani, M. Tehranipoor and J. Plusquellic, "New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time", HOST, 2009.
    • (2009) HOST
    • Salmani, H.1    Tehranipoor, M.2    Plusquellic, J.3
  • 30
    • 51849124268 scopus 로고    scopus 로고
    • Designer's hardware trojan horse
    • Y. Alkabani and F. Koushanfar, "Designer's Hardware Trojan Horse", HOST, 2008.
    • (2008) HOST
    • Alkabani, Y.1    Koushanfar, F.2
  • 31
    • 85084095841 scopus 로고    scopus 로고
    • Designing and implementing malicious hardware
    • S. King et al., "Designing and Implementing Malicious Hardware", LEET, 2008.
    • (2008) LEET
    • King, S.1
  • 32
    • 79952970541 scopus 로고    scopus 로고
    • Trojan side-channels: Lightweight hardware trojans through side-channel engineering
    • L. Lin et al., "Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering", CHES Workshop, 2009.
    • (2009) CHES Workshop
    • Lin, L.1
  • 33
    • 76649121279 scopus 로고    scopus 로고
    • Demonstration of hardware trojans
    • F. Kiamilev and R. Hoover, "Demonstration of Hardware Trojans", DEFCON 16, 2008.
    • (2008) DEFCON , vol.16
    • Kiamilev, F.1    Hoover, R.2
  • 35
    • 70349464732 scopus 로고    scopus 로고
    • Providing secure execution environments with a last line of defense against trojan circuit attacks
    • G. Bloom et al., "Providing Secure Execution Environments with a Last Line of Defense against Trojan Circuit Attacks", Computers and Security, 2009.
    • (2009) Computers and Security
    • Bloom, G.1
  • 38
    • 48049105514 scopus 로고    scopus 로고
    • Detecting malicious logic through structural checking
    • April
    • S. Smith and J. Di, "Detecting Malicious Logic Through Structural Checking", IEEE Region 5 Technical Conference, April 2007.
    • (2007) IEEE Region 5 Technical Conference
    • Smith, S.1    Di, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.