International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 3- Issue 3, March 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Hardware Trojan Model For Attack And Detection Techniques

[Full Text]



Ahmed Aliyu, Abdulaziz Bello, Usman Joda Mohammed, Ibrahim Hussaini Alhassan



Index Terms: Hardware Trojan, integrated circuits (Chips), Electronic design, techniques, Detection, bugs.



Abstract: Today's integrated circuits (ICs) are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. The interventions of human in production of Hardware resources have given room for possible modification of hardware components, so as to achieve some malicious aims. This modification help with possible loop holes in the hardware component for later attack. Due to the increase in popularity aim of attacks using embedded Trojan horse programs into chips, attacker are more likely to suppress them with malicious program, also notwithstanding the increase in disintegration of the design and manufacturing process of our microelectronic products (ICs), we should not only concern about inclusion of unplanned, undesirable hardware features ("bugs"), rather about inclusion of planned malicious hardware features: "Trojan Horses," which act as spies or guerrillas. This paper presents a Model of the fundamental attacks and possible detection techniques of Hardware Trojan. The result of the research has shown a great significance in education and for further researches.



[1]. Hany A.M. Amin, Yousra Alkabani and Gamal M.I. Selim. “System-level protection and hardware Trojan detection using weighted voting “Cairo University, journal of advanced research 2013, pp.1-7.

[2]. J. Clark, S. Leblanc, S. Knight, “Compromise through USB-based Hardware Trojan device, Future Generation Computer Systems” (2010) (In Press). dx.doi.org/10.1016/j.future.2010.04.008.

[3]. John Clark, Sylvain Leblanc, Scott Knight, "Hardware Trojan Device Based on Unintended USB Channels," Network and System Security, International Conference on, pp. 1-8, 2009 Third International Conference on Network and System Security,2009doi.ieeecomputersociety.org/10.1109/NSS.2009.48.

[4]. Waksman A, Sethumadhavan S. Silencing hardware backdoors. In: Proceedings of the 2011 IEEE symposium on security and privacy, SP ’11. IEEE Computer Society; 2011. p. 49–63.

[5]. I. Verbauwhede and P. Schaumont, ‘‘Design Methods for Security and Trust,’’ Proc. Design, Automation and Test in Europe Conf. (DATE 07), EDA Consortium, pp. 672-677.

[6]. Mohammad Tehranipoor and Farinaz Koushanfar, “A Survey of Hardware Trojan Taxonomy and Detection” IEEE Design & Test of Computers, 2010, pp. 10-25.

[7]. G.E. Suh, D. Deng, and A. Chan, ‘‘Hardware Authentication Leveraging Performance Limits in Detailed Simulations and Emulations,’’ Proc. 46th Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 682-687.

[8]. G. Bloom, B. Narahari, and R. Simha, ‘‘OS Support for Detecting Trojan Circuit Attacks,’’ Proc. IEEE Int’l Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE CS Press, 2009, pp. 100-103.

[9]. D. McIntyre et al., ‘‘Dynamic Evaluation of Hardware Trust,’’ Proc. IEEE Int’l Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE CS Press, 2009, pp. 108-111.

[10]. H. Salmani, M. Tehranipoor, and J. Plusquellic, ‘‘New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time,’’ Proc. IEEE Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE CS Press, 2009, pp. 66-73.

[11]. D. Agrawal et al., ‘‘Trojan Detection Using IC Fingerprinting,’’Proc. IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, 2007, pp. 296-310.