To search, Click
below search items.
|
|
All
Published Papers Search Service
|
Title
|
Hardware Trojan Detection
|
Author
|
Ghalia Alluhaib, Hanan Aldissi, Rasha Alqarni, Shoroq Banafee, Wafaa Nagro, and Asia Aljahdali
|
Citation |
Vol. 20 No. 3 pp. 141-147
|
Abstract
|
In this study we present, overview structure of Integrated Circuit (IC), Trojans design and taxonomy that gives a primary step in higher understanding existing and probable threats and the most common techniques for Trojan detection against Hardware Trojan threats. As well countermeasures for hardware Trojan insertion to verify the trustworthiness of the manufactured ICs. Recently security of Integrated Circuits is exposed to hardware Trojans that emerged as a serious security threat, which are malicious alteration to the original circuit either during design or fabrication time. An attacker can easily add Hardware Trojan into Integrated Circuits. Since hardware Trojans are tiny and invisible, their detection is hard. Probably cause disaster effects (Denial of Service, sensitive information leakage from inside a chip-e.g., the key in a cryptographic chip, during field operation. etc.). Especially for those used in susceptible applications such as military or medical. Based on previous researches in Hardware Trojan papers, we conclude the importance of insurance the trustiness of Integrated Circuit (i.e.-protected against Hardware Trojans), where different methods have been proposed to void Hardware Trojans such as Optical Inspection, Side-Channel Analysis (SCA), Run Time Detection Techniques and Logic Test Techniques. The main result of this paper is to exhibit the mostly techniques used for detecting the Hardware Trojans to overcome from spread out the infected integrated circuit into market and reduce the rate of loose and disclosure of critical information.
|
Keywords
|
Hardware trojan, integrated circuit, threats, side channel analysis.
|
URL
|
http://paper.ijcsns.org/07_book/202003/20200319.pdf
|
|