The Hardware Trojan War

Attacks, Myths, and Defenses

  • Swarup Bhunia
  • Mark M.  Tehranipoor

Table of contents

  1. Front Matter
    Pages i-viii
  2. Hardware Trojan Preliminaries

    1. Front Matter
      Pages 1-1
    2. Swarup Bhunia, Atul Prasad Deb Nath, Mark M. Tehranipoor
      Pages 3-14
    3. Jason Vosatka
      Pages 15-51
  3. Hardware Trojan Attacks: Threat Analysis

    1. Front Matter
      Pages 53-53
    2. Rajesh JS, Koushik Chakraborty, Sanghamitra Roy
      Pages 55-74
    3. Mainak Banga, Michael S. Hsiao
      Pages 75-100
    4. Angelos Antonopoulos, Christiana Kapatsori, Yiorgos Makris
      Pages 101-123
    5. Anirudh Iyengar, Swaroop Ghosh
      Pages 125-145
  4. Detection: Logic Testing

    1. Front Matter
      Pages 147-147
    2. Vidya Govindan, Rajat Subhra Chakraborty
      Pages 149-182
    3. Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra
      Pages 183-202
    4. Azadeh Davoodi
      Pages 203-215
  5. Detection: Side-Channel Analysis

    1. Front Matter
      Pages 217-217
    2. Jim Plusquellic, Fareena Saqib
      Pages 219-267
    3. Chongxi Bao, Yang Xie, Yuntao Liu, Ankur Srivastava
      Pages 269-288
  6. Design for Security

    1. Front Matter
      Pages 289-289
    2. Qiaoyan Yu, Jaya Dofe, Zhiming Zhang, Sean Kramer
      Pages 291-325
    3. Qihang Shi, Domenic Forte, Mark M. Tehranipoor
      Pages 327-344
    4. Vinayaka Jyothi, Jeyavijayan (JV) Rajendran
      Pages 345-368
  7. Emerging Trend, Industrial Practices, New Attacks

    1. Front Matter
      Pages 369-369
    2. Swarup Bhunia, Mark M. Tehranipoor
      Pages 385-389

About this book


This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.


Counterfeit electronics Counterfeit integrated circuit Hardware Trojan Attacks Trust Verification of ICs Hardware Obfuscation Hardware security and trust

Editors and affiliations

  • Swarup Bhunia
    • 1
  • Mark M.  Tehranipoor
    • 2
  1. 1.Department of Electrical & Computer EngineeringUniversity of FloridaGainesvilleUSA
  2. 2.Department of Electrical & Computer EngineeringUniversity of FloridaGainesvilleUSA

Bibliographic information