Skip to main content

Hardware Trojan Horses

  • Chapter
  • First Online:
Towards Hardware-Intrinsic Security

Part of the book series: Information Security and Cryptography ((ISC))

Abstract

Over the last two decades we have become dependent on a network of electronic devices that supports a plethora of services, ranging from delivery of entertainment and news to maintenance of business records to filing of legal forms. This network provides a robust platform to handle all kinds of sensitive information at the personal, corporate, or government levels. Furthermore, many physical systems, e.g., the power grid, are currently being connected and to some extent controlled by commands relayed over the very same network. In essence the network permeates and blends into the physical infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    IP-core stands for intellectual property-core and represents third-party hardware modules that achieve a useful isolated task such as audio-video decoders, error correction circuits etc.

  2. 2.

    To address this problem for ICs to be used in the military, some governments have been subsidizing the operations of a few domestic, high-cost trusted fabrication plants.

  3. 3.

    The smallest Trojan became only noticeable when the power profiles were sampled at the low-noise parts of the signal.

References

  1. M. Abramovici, P. Bradley, in Integrated Circuit Security - New Threats and Solutions. Proceedings of Cyber Security and Information Infrastructure Research Workshop (CSIIRW), (Oak Ridge National Laboratory, Oak Ridge, TN, USA, 2009)

    Google Scholar 

  2. S. Adee, The hunt for the kill switch. IEEE Spectrum 45(5), 34–39 (May 2008)

    Article  Google Scholar 

  3. D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, in Trojan Detection Using IC Fingerprinting. Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 20–23 May 2007, pp. 296–310

    Google Scholar 

  4. Y. Alkabani, F. Koushanfar, in Active Hardware Metering for Intellectual Property Protection and Security. USENIX Security Symposium, Boston, MA, USA, 6–10 August 2007, pp. 291–306

    Google Scholar 

  5. Y. Alkabani, F. Koushanfar, in Extended Abstract: Designer’s Hardware Trojan Horse. Proceedings of Hardware-Oriented Security and Trust 2008 (HOST), Anaheim, CA, USA, 13–14 June 2008, pp. 82–83

    Google Scholar 

  6. Y. Alkabani, F. Koushanfar, in Efficient Approximations for IC Trojan Detection. Proceedings of the International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 2–5 Nov 2009

    Google Scholar 

  7. M. Banga, M. Hsiao, in A Region Based Approach for the Identification of Hardware Trojans. Proceedings of Workshop on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA, 13–14 June 2008, pp. 40–47

    Google Scholar 

  8. M. Banga, M. Hsiao, in Novel Sustained Vector Technique for the Detection of Hardware Trojans. Proceedings of the International Conference on VLSI Design, New Delhi, India, 5–9 Jan 2009 , pp. 327–332

    Google Scholar 

  9. M. Banga, M. Hsiao, in VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertion in ICs. Proceedings of Workshop on Hardware-Oriented Security and Trust (HOST), San Francisco, CA, USA, 27 July 2009, pp. 104–107

    Google Scholar 

  10. E. Biham, Y. Carmeli, A. Shamir, in Bug Attacks. Advances in Cryptology. Crypto. Lecture Notes in Computer Science, vol. 5157 (Springer, 2008), Santa Barbara, CA, USA, 17–21 Aug 2008, pp. 221–240

    Google Scholar 

  11. R.S. Chakraborty, S. Bhunia, in Hardware Protection and Authentication Through Netlist Level Obfuscation. Proceedings of the International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 10–13 Nov 2008, pp. 674–677

    Google Scholar 

  12. R.S. Chakraborty, S. Paul, S. Bhunia, in On-Demand Transparency for Improving Hardware Trojan Detectability. Workshop on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA, 13–14 June 2008, pp. 48–50

    Google Scholar 

  13. R. Chakraborty, S. Bhunia, in Security Against Hardware Trojan Through a Novel Application of Design Obfuscation. Proceedings of the International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 2–5 Nov 2009, pp. 113–116

    Google Scholar 

  14. China virus found in Seagate drives in Taiwan: report Reuters News Agency, Nov 12, 2007. http://www.reuters.com/article/idUSTP20376020071112

  15. DARPA TRUST Program Information, http://www.acq.osd.mil/dsb/reports/2005-02- HPMS_Report_Final.pdf

  16. Defense Science Board Task Force, High Performance Microchip Supply, February 2005. http://www.acq.osd.mil/dsb/reports/2005-02-HPMS_Report_Final.pdf

  17. Innovation at risk: Intellectual Property Challenges and Opportunities, Semiconductor Equipment and Materials Industry (SEMI), 2008.

    Google Scholar 

  18. S. Jha, S. K. Jha, in Randomization Based Probabilistic Approach to Detect Trojan Circuits. Proceedings of the IEEE High Assurance Systems Engineering Symposium, Nanjing, China, 3–5 Dec 2008, pp. 117–124

    Google Scholar 

  19. Y. Jin, N. Kupp, Y. Makris, in Experiences in Hardware Trojan Design and Implementation. Workshop on Hardware-Oriented Security and Trust (HOST), San Francisco, CA, USA, 27 June 2009, pp. 50–57

    Google Scholar 

  20. Y. Jin, Y. Makris, in Hardware Trojan Detection Using Path Delay Fingerprint. Proceedings of Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA, 13–14 June 2008

    Google Scholar 

  21. S. King, J. Tucek, A. Cozzieand C. Grier, W. Jiang, Y Zhou, in Designing and Implementing Malicious Hardware. Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, USA, 14 Apr 2008, pp. 1–8

    Google Scholar 

  22. J. Li, J. Lach, in At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. Proceedings of Workshop on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA, 13–14 June 2008, pp. 8–14

    Google Scholar 

  23. J. Lieberman, Whitepaper on National Security Aspects of the Global Migration of the US Semiconductor Industry. http://lieberman.senate.gov/documents/whitepapers/ semicon-ductor.pdf; June 2003

  24. M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey, in Hardware Trojan Horse Detection Using Gate-Level Characterization. Design Automation Conference (DAC), San Francisco, CA, USA, 26–31 July 2009

    Google Scholar 

  25. R. Rad, X. Wang, J. Plusquellic, M. Tehranipoor, in Taxonomy of Trojans and Methods of Detection for IC Trust. Proceedings of the International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 10–13 Nov 2008

    Google Scholar 

  26. H. Salmani, M. Tehranipoor, J. Plusquellic, in New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. Workshop on Hardware-Oriented Security and Trust (HOST), San Francisco, CA, USA, 27 July 2009

    Google Scholar 

  27. M. Tehranipoor, F. Koushanfar, A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design and Test of Computers, Jan/Feb 2010, pp. 10–25

    Google Scholar 

  28. X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, in Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis. Proceedings of the International Symposium on Fault and Defect Tolerance in VLSI Systems (DFT), 2008

    Google Scholar 

  29. X. Wang, M. Tehranipoor, J. Plusquellic, in Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. Proceedings of IEEE Intlernational Workshop on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA, 13–14 June 2008, pp. 15–19

    Google Scholar 

  30. F. Wolff, C. Papachristou, S. Bhunia, R. Chakraborty, Towards Trojan Free Trusted ICs: Problem Analysis and Detection Scheme. Proceedings of Design, Automation and Test in Europe (DATE), Munich, Germany, 10–14 Mar 2008, pp. 1362–1365

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank Farinaz Koushanfar of Rice University for her contribution to the Trojan detection part of the chapter.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Tehranipoor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Tehranipoor, M., Sunar, B. (2010). Hardware Trojan Horses. In: Sadeghi, AR., Naccache, D. (eds) Towards Hardware-Intrinsic Security. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14452-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14452-3_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14451-6

  • Online ISBN: 978-3-642-14452-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics