Hardware trojans

Lessons learned after one decade of research

K. Xiao, D. Forte, Y. Jin, R. Karri, S. Bhunia, M. Tehranipoor

Research output: Contribution to journalArticle

Abstract

Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially for those integrated circuits (ICs) and systems used in critical applications and cyber infrastructure. While hardware Trojans have been explored significantly in academia over the last decade, there remains room for improvement. In this article, we examine the research on hardware Trojans from the last decade and attempt to capture the lessons learned. A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art. Then the past countermeasures and publication trends are categorized based on the adversarial model and topic. Through this analysis, we identify what has been covered and the important problems that are underinvestigated. We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research.

Original languageEnglish (US)
Article number6
JournalACM Transactions on Design Automation of Electronic Systems
Volume22
Issue number1
DOIs
StatePublished - May 1 2016

Fingerprint

Hardware
Electronic equipment
Taxonomies
Supply chains
Integrated circuits
Fabrication
Costs
Hardware security

Keywords

  • Attack model
  • Countermeasures
  • Hardware security and trust
  • Hardware Trojan attacks

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering

Cite this

Hardware trojans : Lessons learned after one decade of research. / Xiao, K.; Forte, D.; Jin, Y.; Karri, R.; Bhunia, S.; Tehranipoor, M.

In: ACM Transactions on Design Automation of Electronic Systems, Vol. 22, No. 1, 6, 01.05.2016.

Research output: Contribution to journalArticle

Xiao, K. ; Forte, D. ; Jin, Y. ; Karri, R. ; Bhunia, S. ; Tehranipoor, M. / Hardware trojans : Lessons learned after one decade of research. In: ACM Transactions on Design Automation of Electronic Systems. 2016 ; Vol. 22, No. 1.
@article{42fe2966b4e74f06bb5ecb7811438fe6,
title = "Hardware trojans: Lessons learned after one decade of research",
abstract = "Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially for those integrated circuits (ICs) and systems used in critical applications and cyber infrastructure. While hardware Trojans have been explored significantly in academia over the last decade, there remains room for improvement. In this article, we examine the research on hardware Trojans from the last decade and attempt to capture the lessons learned. A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art. Then the past countermeasures and publication trends are categorized based on the adversarial model and topic. Through this analysis, we identify what has been covered and the important problems that are underinvestigated. We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research.",
keywords = "Attack model, Countermeasures, Hardware security and trust, Hardware Trojan attacks",
author = "K. Xiao and D. Forte and Y. Jin and R. Karri and S. Bhunia and M. Tehranipoor",
year = "2016",
month = "5",
day = "1",
doi = "10.1145/2906147",
language = "English (US)",
volume = "22",
journal = "ACM Transactions on Design Automation of Electronic Systems",
issn = "1084-4309",
publisher = "Association for Computing Machinery (ACM)",
number = "1",

}

TY - JOUR

T1 - Hardware trojans

T2 - Lessons learned after one decade of research

AU - Xiao, K.

AU - Forte, D.

AU - Jin, Y.

AU - Karri, R.

AU - Bhunia, S.

AU - Tehranipoor, M.

PY - 2016/5/1

Y1 - 2016/5/1

N2 - Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially for those integrated circuits (ICs) and systems used in critical applications and cyber infrastructure. While hardware Trojans have been explored significantly in academia over the last decade, there remains room for improvement. In this article, we examine the research on hardware Trojans from the last decade and attempt to capture the lessons learned. A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art. Then the past countermeasures and publication trends are categorized based on the adversarial model and topic. Through this analysis, we identify what has been covered and the important problems that are underinvestigated. We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research.

AB - Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially for those integrated circuits (ICs) and systems used in critical applications and cyber infrastructure. While hardware Trojans have been explored significantly in academia over the last decade, there remains room for improvement. In this article, we examine the research on hardware Trojans from the last decade and attempt to capture the lessons learned. A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art. Then the past countermeasures and publication trends are categorized based on the adversarial model and topic. Through this analysis, we identify what has been covered and the important problems that are underinvestigated. We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research.

KW - Attack model

KW - Countermeasures

KW - Hardware security and trust

KW - Hardware Trojan attacks

UR - http://www.scopus.com/inward/record.url?scp=84973470936&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84973470936&partnerID=8YFLogxK

U2 - 10.1145/2906147

DO - 10.1145/2906147

M3 - Article

VL - 22

JO - ACM Transactions on Design Automation of Electronic Systems

JF - ACM Transactions on Design Automation of Electronic Systems

SN - 1084-4309

IS - 1

M1 - 6

ER -