4.1 Review

Ten years of hardware Trojans: a survey from the attacker's perspective

Journal

IET COMPUTERS AND DIGITAL TECHNIQUES
Volume 14, Issue 6, Pages 231-246

Publisher

INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-cdt.2020.0041

Keywords

invasive software; field programmable gate arrays; industrial property; integrated circuit manufacture; integrated circuit design; integrated circuit testing; circuit CAD; hardware Trojan detection techniques; hardware Trojan design; in-house design team attacks; third-party intellectual property vendor attacks; fabrication stage attacks; distribution stage attacks; hardware Trojan attack scenarios; field-programmable gate array Trojan attacks; computer-aided design tool attacks; hardware Trojan defences; hardware Trojan implementation methods; adversarial model; overhead analysis; copyright owner; integrated circuit industry

Funding

  1. National Natural Science Foundation of China [61602241]
  2. Engineering and Physical Sciences Research Council (EPSRC) [EP/N508664/-CSIT2]

Ask authors/readers for more resources

Hardware Trojan detection techniques have been studied extensively. However, to develop reliable and effective defenses, it is important to figure out how hardware Trojans are implemented in practical scenarios. The authors attempt to make a review of the hardware Trojan design and implementations in the last decade and also provide an outlook. Unlike all previous surveys that discuss Trojans from the defender's perspective, for the first time, the authors study the Trojans from the attacker's perspective, focusing on the attacker's methods, capabilities, and challenges when the attacker designs and implements a hardware Trojan. First, the authors present adversarial models in terms of the adversary's methods, adversary's capabilities, and adversary's challenges in seven practical hardware Trojan implementation scenarios: in-house design team attacks, third-party intellectual property vendor attacks, computer-aided design tools attacks, fabrication stage attacks, testing stage attacks, distribution stage attacks, and field-programmable gate array Trojan attacks. Second, the authors analyse the hardware Trojan implementation methods under each adversarial model in terms of seven aspects/metrics: hardware Trojan attack scenarios, the attacker's motivation, feasibility, detectability (anti-detection capability), protection and prevention suggestions for the designer, overhead analysis, and case studies of Trojan implementations. Finally, future directions on hardware Trojan attacks and defenses are also discussed.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.1
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available