Abstract
Hardware Trojans, a relatively unheard threat viz-a-viz the typical software-based malwares and virus attacks that keep betiding across is being realized gradually by the IT security domain including the users, the IT Security professionals, and the corporate sector who all of a sudden discern the immense threat they might already be living in with. A distinctive dormant Hardware Trojan threat can be so flagitious that the victim does not even know if he is effectuated when he might already be. Hardware Trojans are evolving threats that can shake the roots of any set and constituted government or corporate giant for that matter. Unlike Software virus/malware threats, Hardware Trojans are pertinacious in nature. This paper brings out an overview of these threats including classifications, mechanisms they work on and the current set of countermeasures being researched upon.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Trojan at https://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
Mitra S, Wong HSP, Wong S (2015) Stopping Hardware Trojans in their tracks
Bhunia S (2014) Hardware trojan attacks: threat analaysis and counter measures
Karri R (2010) Trustworthy hardware: Identifying and classifying Hardware Trojans. IEEE Comput 43(10)
Wang X, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proceedings of the 2008 IEEE international workshop on hardware-oriented security and trust, Washington
Zhang J (2014) DeTrust- defeating hardware trust verification with stealthy implicitly-triggered Hardware Trojans
Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat
Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat, p 47, Para 5
Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat, p 49, Para 5.3
Aliyu A, Bello A (2014) Hardware Trojan model for attack and detection techniques
Rad R, Plusquellic J, Tehranipoor M (2010) A sensitivity analysis of power signal methods for detecting Hardware Trojans under real process and environmental conditions
Wu TF, Wong HSP, Wong S, Mitra S (2015) TPAD-hardware trojan prevention and detection for trusted integrated circuits
Lin L, Burleson W (2009) MOLES—malicious off-chip leakage enabled by side-channels
Spread Spectrum at http://searchnetworking.techtarget.com/definition/spread-spectrum
Hardware Malware book By Edgar Weippl (2013) Adrian Dabrowski, Heidelinde Hobel, p 67, para 4.2
King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y (2008) Designing and implementing malicious hardware. In: Proceedings of the first USENIX workshop on large-scale exploits and emergent threats(LEET)
Adee S (2008) The hunt for the kill switch. IEEE Spect 45(5):34–39
Skorobogatov S (2012) Breakthrough silicon scanning discovers backdoor in military chip. In: Cryptographic hardware and embedded systems (CHES’12), vol 7428. Springer, Berlin, pp 23–40
The Embedded Systems Challenge at https://csaw.engineering.nyu.edu/
DARPA Trust in IC at http://www.darpa.mil/program/trusted-integrated-circuits
Shahrjerdi D, Rajendran J (2014) Shielding and securing integrated circuits with sensors
Hardware Malware book By Edgar Weippl (2013) Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, p 67, para 4.2
Aliyu A, Bello A (2014) Hardware Trojan model for attack and detection techniques
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tiwari, A., Soni, C. (2018). Hardware Trojans: An Austere Menace Ahead. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_34
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)