作者
Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, Mohammad Tehranipoor
发表日期
2016/5/27
期刊
ACM Transactions on Design Automation of Electronic Systems (TODAES)
卷号
22
期号
1
页码范围
1-23
出版商
ACM
简介
Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties) pose major security concerns, especially for those integrated circuits (ICs) and systems used in critical applications and cyber infrastructure. While hardware Trojans have been explored significantly in academia over the last decade, there remains room for improvement. In this article, we examine the research on hardware Trojans from the last decade and attempt to capture the lessons learned. A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art. Then the past countermeasures and publication trends are categorized based on the adversarial model and …
引用总数
20162017201820192020202120222023202484354637692917733
学术搜索中的文章
K Xiao, D Forte, Y Jin, R Karri, S Bhunia… - ACM Transactions on Design Automation of Electronic …, 2016