Roadmap for Trusted Hardware – Part II: Trojan Detection Solutions and Design-for-Trust Challenges
Globalization of the semiconductor industry and horizontal design and fabrication processes have made integrated circuits (ICs) increasingly vulnerable to malicious activities and alterations. The vulnerabilities have raised serious concerns regarding possible threats to military systems, financial infrastructures, and transportation security systems. An adversary can introduce a Trojan to disable and/or destroy a system at some specific future time. Alternatively, the attacker can design a failure mode such as wire failure, which survives the testing phase and fails before the expected lifetime. A Trojan can also be designed to leak confidential information and secret keys covertly. Detection of such Trojans is extremely difficult. This article discusses various detection techniques and presents the challenges that must be addressed.
Index Terms: B.4.5 Reliability, Testing, and Fault-Tolerance, B.7.3 Reliability and Testing, B.9 Power Management, B.2.3 Reliability, Testing, and Fault-Tolerance, B.7.3 Reliability and Testing, C.2 Communication/Networking and Information Technology, H.3.5 Online Information Services, A General Literature, software architecture, services computing, requirements engineering, project management, Software Engineering, A.0 General, B.7 Integrated Circuits, B.1.m.a Emerging technologies,Citation: Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, Michel Wang, Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, "Roadmap for Trusted Hardware – Part II: Trojan Detection Solutions and Design-for-Trust Challenges," Computer, 22 Dec. 2010. IEEE computer Society Digital Library. IEEE Computer Society,
View the original article here
This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
0 comments
Post a Comment