Skip to main content

The Global Integrated Circuit Supply Chain Flow and the Hardware Trojan Attack

  • Chapter
  • First Online:
Trusted Digital Circuits

Abstract

The complexity of modern designs, the significant cost of research and development, and the shrinking time-to-market window heavily enforce the horizontal integrated circuit design flow. Many entities across the globe might be involved in the flow and none are necessarily trusted. A malicious party can implement a hardware Trojan attack through manipulating a circuit to undermine its characteristics under rare circumstances at different stages of the flow before and after circuit manufacturing. Detection of hardware Trojans using existing pre-silicon and post-silicon verification techniques is a very challenging task because of the complexity of modern designs, their verity of application, and limited time for verification. This chapter provides an overview on the global supply chain for integrated circuits and the hardware Trojan attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Statista: forecast of worldwide semiconductor sales of integrated circuits. https://www.statista.com/statistics/519456/forecast-of-worldwide-semiconductor-sales-of-integrated-circuits/. Accessed 22 Jan 2018

  2. S. Patel, Changing SoC design methodologies to automate IP integration and reuse. https://www.design-reuse.com/articles/21207/ip-integration-reuse-automation.html. Accessed 22 Jan 2018

  3. K.M. Mohan, Outsourcing Trends in Semiconductor Industry, Massachusetts Institute of Technology, 2010

    Google Scholar 

  4. Semiconductor silicon IP market. https://www.mordorintelligence.com/industry-reports/global-semiconductor-silicon-intellectual-property-market-industry. Accessed 22 Jan 2018

  5. R. Saleh, S. Wilton, S. Mirabbasi, A. Hu, M. Greenstreet, G. Lemieux, P.P. Pande, C. Grecu, A. Ivanov, System-on-chip: reuse and integration. Proc. IEEE 94(6), 1050–1069 (2006)

    Article  Google Scholar 

  6. India Semiconductor and Embedded Design Service Industry (2007–2010), Market, Technology and Ecosystem Analysis (India Semiconductor Association, Bangalore, 2008)

    Google Scholar 

  7. J. Villasenor, Compromised By Design? Securing the Defense Electronics Supply Chain (The Center for Technology Innovation at Brookings, Washington, 2013)

    Google Scholar 

  8. B. Johnson, D. Freeman, D. Christensen, S.T. Wang, Market trends: rising costs of production limit availability of leading-edge fabs. https://www.gartner.com/doc/2163515/market-trends-rising-costs-production. Accessed 22 Jan 2018

  9. M.D. Platzer, J.F. Sargent Jr., U.S. semiconductor manufacturing: industry trends, global competition, federal policy (2016)

    Google Scholar 

  10. H. Jones, Whitepaper: semiconductor industry from 2015 to 2025. http://www.semi.org/en/node/57416. Accessed 22 Jan 2018

  11. A. Avizienis, J.-C. Laprie, B. Randell, C. Landwehr, Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11–33 (2004)

    Article  Google Scholar 

  12. L.-T. Wang, C.-W. Wu, X. Wen, VLSI Test Principles and Architectures (Morgan Kaufmann Publishers, San Francisco, 2006)

    Google Scholar 

  13. H. Salmani, M. Tehranipoor, R. Karri, On design vulnerability analysis and trust benchmarks development, in 2013 IEEE 31st International Conference on Computer Design, ICCD 2013, Asheville, NC, 6–9 October 2013, pp. 471–474

    Google Scholar 

  14. W. Chen, S. Ray, J. Bhadra, M. Abadir, L.C. Wang, Challenges and trends in modern SoC design verification. IEEE Des. Test 34(5), 7–22 (2017)

    Article  Google Scholar 

  15. P. Mishra, R. Morad, A. Ziv, S. Ray, Post-silicon validation in the SoC era: a tutorial introduction. IEEE Des. Test 34(3), 68–92 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Salmani, H. (2018). The Global Integrated Circuit Supply Chain Flow and the Hardware Trojan Attack. In: Trusted Digital Circuits. Springer, Cham. https://doi.org/10.1007/978-3-319-79081-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-79081-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-79080-0

  • Online ISBN: 978-3-319-79081-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics