Date of Publication :7th September 2015
Abstract: Time to market demand has forced integrated circuit design, manufacturing and testing to be done at different places across globe. This approach has led to numerous security concerns like overbuilding of chips from foundries, IP protection, counterfeiting and hardware Trojans. In this work, we focus on hardware Trojans in chips. In the process of finding the answer to above mentioned security issues, we present literature survey, interim results and a holistic view on possible future work. We also present the case study of hardware Trojans.
Reference :
-
[1]. Rostami M, Koushanfar. F, Karri. R, “A Primer on Hardware Security: Models, Methods, and Metrics”, Proceedings of IEEE, Vol. 102, Issue – 8, pp. 1283- 1295, Aug 2014.
[2] “Defense Science Board (DSB) study on High Performance Microchip Supply,” www.acq.osd.mil/dsb/ reports/ADA435563.pdf, 2005.
[3] SEMI, “Innovation is at risk as semiconductor equipment and materials industry loses up to $4 billion annually due to IP infringement.” www.semi.org/en/Press/P043775, 2008.
[4] Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Flottes, Rouzeyre and Verbauwhede, “Test versus Security: Past and Present”, IEEE transactions on emerging computing-2013.
[5] Stephan Mangard et.al.,”Power Analysis Attacks:Revealing the secrets of smart cards” Springer Science-2007.
[6] M. Tehranipoor and F. Koushanfar, “A survey of hardware trojan taxonomy and detection,” IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10–25, 2010.
[7]. DARPA, “Integrity and Reliability of Integrated Circuits (IRIS),” http://www.darpa.mil/Our\_Work/MTO/Programs/ Integri ty\_and\_ReliabilityofIntegratedCircuits, 2012.
[8] https://www.trust-hub.org/resources
[9]. Xuehui Zhang and Mohammad Tehranipoor, Case Study: Detecting Hardware Trojans in Third-Party Digital IP Cores, IEEE International Symposium on HOST-2011.
[10]. Trey Reece, William H Robinson, “Analysis of data-leak hardware Trojans in AES cryptographic circuits” Technologies for Homeland Security (HST), 2013 IEEE International Conference on pp. 467-472
[11]. L. Lin, M. Kasper, T. Güneysu, C. Paar and W. Burleson, "Trojan Sideâ€Channels: Lightweight Hardware Trojans through Side†Channel Engineering," 11th International Workshop Cryptographic Hardware and Embedded Systems (CHES), pp. 382â€395, 2009.
[12]. Seetharaman Narasimahan, et.al, Hardware Trojan Detection by Multiple Parameter Side-Channel Analysis, IEEE Transactions on computers, vol.62, No.11, November-2013.