Netinfo Security ›› 2016, Vol. 16 ›› Issue (1): 11-17.doi: 10.3969/j.issn.1671-1122.2016.01.003

• Orginal Article • Previous Articles     Next Articles

Threat Analysis and Detection Techniques of Hardware Trojans

Yu ZHOU1,2, Zongguang YU1,3()   

  1. 1. No. 58 Research Institute, China Electronic Technology Group Corporation, Wuxi Jiangsu 214072, China
    2. China Academy of Electronics and Information Technology, Beijing 100041, China
    3. School of Microelectornics, Xidian University, Xi'an Shaanxi 710071, China
  • Received:2015-11-19 Online:2016-01-01 Published:2020-05-13

Abstract:

Software virus has been considered as the only security threat of a computer system, while the IC (integrated circuit) used in a computer system is considered trusted and secure until the emergency of hardware Trojan. The hardware Trojan is formed by malicious modification during designing and manufacturing, which changes the function and performance of ICs. Different hardware Trojans cause different impact on ICs, like changing the function, leaking internal information or assisting software virus attack. As the design complexity and cost of IC designing and manufacturing continue growing, IC industry relies on the global cooperation which enhances the vulnerability to hardware Trojan attacks. In the paper, we analyze the threat of hardware Trojan attack including the attacking model and Trojan taxonomy, introduce the latest research efforts on detection techniques, and finally describe the area of potential future research.

Key words: hardware Trojan, IP security verification, side-channel analysis, logic test, optical analysis

CLC Number: