Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. A hardware Trojan is a malicious modification of the circuitry of an integrated circuit. A hardware Trojan is completely characterized by its physical representation and its behavior. The payload of an HTH is the entire activity that the Trojan executes when it is triggered. In general, malicious Trojans try to bypass or disable the security fence of a system: It can leak confidential information by radio emission. HTHs also could disable, derange or destroy the entire chip or components of it.
Recommendations
Security against hardware Trojan through a novel application of design obfuscation
ICCAD '09: Proceedings of the 2009 International Conference on Computer-Aided DesignMalicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The ...
Hunting Trojan Horses
ASID '06: Proceedings of the 1st workshop on Architectural and system support for improving software dependabilityHTH (Hunting Trojan Horses) is a security framework developed for detecting difficult types of intrusions. HTH is intended as a complement to anti-virus software in that it targets unknown and zero-day Trojan Horses and Backdoors. In order to accurately ...
The undetectable and unprovable hardware trojan horse
DAC '13: Proceedings of the 50th Annual Design Automation ConferenceWe have developed an approach for automatic embedding of customizable hardware Trojan horses (HTHs) into an arbitrary finite state machine. The HTH can be used to facilitate a variety of security attacks and does not require any additional gates, ...