Hardware Trojans: Lessons Learned After One Decade Of Research
Keywords
Attack model; Countermeasures; Hardware security and trust; Hardware Trojan attacks
Abstract
Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially for those integrated circuits (ICs) and systems used in critical applications and cyber infrastructure. While hardware Trojans have been explored significantly in academia over the last decade, there remains room for improvement. In this article, we examine the research on hardware Trojans from the last decade and attempt to capture the lessons learned. A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art. Then the past countermeasures and publication trends are categorized based on the adversarial model and topic. Through this analysis, we identify what has been covered and the important problems that are underinvestigated. We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research.
Publication Date
5-1-2016
Publication Title
ACM Transactions on Design Automation of Electronic Systems
Volume
22
Issue
1
Document Type
Article
Personal Identifier
scopus
DOI Link
https://doi.org/10.1145/2906147
Copyright Status
Unknown
Socpus ID
84973470936 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/84973470936
STARS Citation
Xiao, K.; Forte, D.; Jin, Y.; Karri, R.; and Bhunia, S., "Hardware Trojans: Lessons Learned After One Decade Of Research" (2016). Scopus Export 2015-2019. 2299.
https://stars.library.ucf.edu/scopus2015/2299