Title
Hard to Detect Combinational Hardware Trojans
Abstract
Hardware Trojan (HT), caused by outsiders, modifies fabrication of a golden IC and avoids normal testing. The alteration by an HT targets disabling the main function of the IC or degrades signal integrity. Most vulnerable HTs are even designed to break hardware security. This work explores possible combinational trojan circuits, vulnerable to hardware design. It focuses on trigger and payload functions of HTs. The identified malicious hardwares are the tightly distributed large size functional type trojan, where activation is done via data, instruction or interrupt, that fall in internally activated trojan category. The detection probability of such HTs is low in comparison to the combinational HTs proposed in the literature.
Year
DOI
Venue
2018
10.1109/ISED.2018.8704008
2018 8th International Symposium on Embedded Computing and System Design (ISED)
Keywords
Field
DocType
Trojan horses,Payloads,Logic gates,Hardware,Integrated circuits,Testing,Logic circuits
Interrupt,Hardware Trojan,Logic gate,Hardware security module,Computer science,Signal integrity,Trojan,Computer hardware,Integrated circuit,Payload
Conference
ISBN
Citations 
PageRank 
978-1-5386-6575-6
0
0.34
References 
Authors
0
3
Name
Order
Citations
PageRank
Nilanjana Das100.68
Mousumi Saha224.13
Biplab K. Sikdar321740.85