CAD for Assurance of Electronic Systems
 

IC Trojan Attacks

Description


Security of a computer system has been traditionally related to the security of the software or the information being processed. The underlying hardware used for information processing has been considered trusted. The emergence of hardware Trojan attacks violates this root of trust. These attacks, in the form of malicious modifications of electronic hardware at different stages of its life cycle, pose major security concerns in the electronics industry. An adversary can mount such an attack with an objective to cause operational failure or to leak secret information from inside a chip e.g., the key in a cryptographic chip, during field operation.

Hardware Trojan attacks have emerged as a major security concern for integrated circuits. These attacks relate to malicious modifications of an IC during design or fabrication in an untrusted design house or foundry, which involve untrusted people, design tools, or components. Such modifications can give rise to undesired functional behavior of an IC, or provide covert channels or backdoor through which sensitive information can be leaked. To detect and prevent such attacks, tools such as MERS, MERO, Network Flow Attack for Split Manufacturing, and TRIT-PCB have been developed.

Related Tools

Publications

Hoque, Tamzidul; Yang, Shuo; Bhattacharyay, Aritra; Cruz, Jonathan; Bhunia, Swarup

An Automated Framework for Board-level Trojan Benchmarking Miscellaneous

2020.

Abstract | Links | BibTeX

Facon, Adrien; Guilley, Sylvain; Lec'hvien, Matthieu; Marion, Damien; Perianin, Thomas

Binary Data Analysis for Source Code Leakage Assessment Proceedings Article

In: Innovative Security Solutions for Information Technology and Communications, pp. 391–409, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-12942-2.

Abstract | Links | BibTeX

Souissi, Youssef; Facon, Adrien; Guilley, Sylvain

Virtual Security Evaluation Proceedings Article

In: Carlet, Claude; Guilley, Sylvain; Nitaj, Abderrahmane; Souidi, El Mamoun (Ed.): Codes, Cryptology and Information Security, pp. 3–12, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16458-4.

Abstract | Links | BibTeX

Takarabt, Sofiane; Chibani, Kais; Facon, Adrien; Guilley, Sylvain; Mathieu, Yves; Sauvage, Laurent; Souissi, Youssef

Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification Proceedings Article

In: 2018 IEEE 3rd International Verification and Security Workshop (IVSW), pp. 74-79, 2018.

Abstract | Links | BibTeX

Wang, Yujie; Chen, Pu; Hu, Jiang; Li, Guofeng; Rajendran, Jeyavijayan

The Cat and Mouse in Split Manufacturing Journal Article

In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 26, no. 5, pp. 805-817, 2018, ISSN: 1557-9999.

Abstract | Links | BibTeX

Huang, Yuanwen; Bhunia, Swarup; Mishra, Prabhat

MERS: Statistical Test Generation for Side-Channel Analysis Based Trojan Detection Proceedings Article

In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 130–141, Association for Computing Machinery, Vienna, Austria, 2016, ISBN: 9781450341394.

Abstract | Links | BibTeX

Bhunia, Swarup; Hsiao, Michael S.; Banga, Mainak; Narasimhan, Seetharam

Hardware Trojan Attacks: Threat Analysis and Countermeasures Journal Article

In: Proceedings of the IEEE, vol. 102, no. 8, pp. 1229-1247, 2014, ISSN: 1558-2256.

Abstract | Links | BibTeX

Chakraborty, Rajat Subhra; Wolff, Francis; Paul, Somnath; Papachristou, Christos; Bhunia, Swarup

MERO: A Statistical Approach for Hardware Trojan Detection Proceedings Article

In: Clavier, Christophe; Gaj, Kris (Ed.): Cryptographic Hardware and Embedded Systems - CHES 2009, pp. 396-410, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009, ISBN: 978-3-642-04138-9.

Abstract | Links | BibTeX