Skip to main content

Hardware Trojans: An Austere Menace Ahead

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

Hardware Trojans, a relatively unheard threat viz-a-viz the typical software-based malwares and virus attacks that keep betiding across is being realized gradually by the IT security domain including the users, the IT Security professionals, and the corporate sector who all of a sudden discern the immense threat they might already be living in with. A distinctive dormant Hardware Trojan threat can be so flagitious that the victim does not even know if he is effectuated when he might already be. Hardware Trojans are evolving threats that can shake the roots of any set and constituted government or corporate giant for that matter. Unlike Software virus/malware threats, Hardware Trojans are pertinacious in nature. This paper brings out an overview of these threats including classifications, mechanisms they work on and the current set of countermeasures being researched upon.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Trojan at https://en.wikipedia.org/wiki/Trojan_horse_%28computing%29

  2. Mitra S, Wong HSP, Wong S (2015) Stopping Hardware Trojans in their tracks

    Google Scholar 

  3. Bhunia S (2014) Hardware trojan attacks: threat analaysis and counter measures

    Google Scholar 

  4. Karri R (2010) Trustworthy hardware: Identifying and classifying Hardware Trojans. IEEE Comput 43(10)

    Google Scholar 

  5. Wang X, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proceedings of the 2008 IEEE international workshop on hardware-oriented security and trust, Washington

    Google Scholar 

  6. Zhang J (2014) DeTrust- defeating hardware trust verification with stealthy implicitly-triggered Hardware Trojans

    Google Scholar 

  7. Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat

    Google Scholar 

  8. Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat, p 47, Para 5

    Google Scholar 

  9. Shield J, Hopkins B (2015) Hardware Trojans—a systemic threat, p 49, Para 5.3

    Google Scholar 

  10. Aliyu A, Bello A (2014) Hardware Trojan model for attack and detection techniques

    Google Scholar 

  11. Rad R, Plusquellic J, Tehranipoor M (2010) A sensitivity analysis of power signal methods for detecting Hardware Trojans under real process and environmental conditions

    Google Scholar 

  12. Wu TF, Wong HSP, Wong S, Mitra S (2015) TPAD-hardware trojan prevention and detection for trusted integrated circuits

    Google Scholar 

  13. Lin L, Burleson W (2009) MOLES—malicious off-chip leakage enabled by side-channels

    Google Scholar 

  14. Spread Spectrum at http://searchnetworking.techtarget.com/definition/spread-spectrum

  15. Hardware Malware book By Edgar Weippl (2013) Adrian Dabrowski, Heidelinde Hobel, p 67, para 4.2

    Google Scholar 

  16. King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y (2008) Designing and implementing malicious hardware. In: Proceedings of the first USENIX workshop on large-scale exploits and emergent threats(LEET)

    Google Scholar 

  17. Adee S (2008) The hunt for the kill switch. IEEE Spect 45(5):34–39

    Google Scholar 

  18. Skorobogatov S (2012) Breakthrough silicon scanning discovers backdoor in military chip. In: Cryptographic hardware and embedded systems (CHES’12), vol 7428. Springer, Berlin, pp 23–40

    Google Scholar 

  19. The Embedded Systems Challenge at https://csaw.engineering.nyu.edu/

  20. DARPA Trust in IC at http://www.darpa.mil/program/trusted-integrated-circuits

  21. Shahrjerdi D, Rajendran J (2014) Shielding and securing integrated circuits with sensors

    Google Scholar 

  22. Hardware Malware book By Edgar Weippl (2013) Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, p 67, para 4.2

    Google Scholar 

  23. Aliyu A, Bello A (2014) Hardware Trojan model for attack and detection techniques

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anupam Tiwari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tiwari, A., Soni, C. (2018). Hardware Trojans: An Austere Menace Ahead. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics