Cargando…
Hardware Trojans in Chips: A Survey for Detection and Prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourc...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570641/ https://www.ncbi.nlm.nih.gov/pubmed/32927772 http://dx.doi.org/10.3390/s20185165 |
_version_ | 1783596993878163456 |
---|---|
author | Dong, Chen Xu, Yi Liu, Ximeng Zhang, Fan He, Guorong Chen, Yuzhong |
author_facet | Dong, Chen Xu, Yi Liu, Ximeng Zhang, Fan He, Guorong Chen, Yuzhong |
author_sort | Dong, Chen |
collection | PubMed |
description | Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted. |
format | Online Article Text |
id | pubmed-7570641 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75706412020-10-28 Hardware Trojans in Chips: A Survey for Detection and Prevention Dong, Chen Xu, Yi Liu, Ximeng Zhang, Fan He, Guorong Chen, Yuzhong Sensors (Basel) Review Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted. MDPI 2020-09-10 /pmc/articles/PMC7570641/ /pubmed/32927772 http://dx.doi.org/10.3390/s20185165 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Dong, Chen Xu, Yi Liu, Ximeng Zhang, Fan He, Guorong Chen, Yuzhong Hardware Trojans in Chips: A Survey for Detection and Prevention |
title | Hardware Trojans in Chips: A Survey for Detection and Prevention |
title_full | Hardware Trojans in Chips: A Survey for Detection and Prevention |
title_fullStr | Hardware Trojans in Chips: A Survey for Detection and Prevention |
title_full_unstemmed | Hardware Trojans in Chips: A Survey for Detection and Prevention |
title_short | Hardware Trojans in Chips: A Survey for Detection and Prevention |
title_sort | hardware trojans in chips: a survey for detection and prevention |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570641/ https://www.ncbi.nlm.nih.gov/pubmed/32927772 http://dx.doi.org/10.3390/s20185165 |
work_keys_str_mv | AT dongchen hardwaretrojansinchipsasurveyfordetectionandprevention AT xuyi hardwaretrojansinchipsasurveyfordetectionandprevention AT liuximeng hardwaretrojansinchipsasurveyfordetectionandprevention AT zhangfan hardwaretrojansinchipsasurveyfordetectionandprevention AT heguorong hardwaretrojansinchipsasurveyfordetectionandprevention AT chenyuzhong hardwaretrojansinchipsasurveyfordetectionandprevention |