Cargando…

Hardware Trojans in Chips: A Survey for Detection and Prevention

Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourc...

Descripción completa

Detalles Bibliográficos
Autores principales: Dong, Chen, Xu, Yi, Liu, Ximeng, Zhang, Fan, He, Guorong, Chen, Yuzhong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570641/
https://www.ncbi.nlm.nih.gov/pubmed/32927772
http://dx.doi.org/10.3390/s20185165
_version_ 1783596993878163456
author Dong, Chen
Xu, Yi
Liu, Ximeng
Zhang, Fan
He, Guorong
Chen, Yuzhong
author_facet Dong, Chen
Xu, Yi
Liu, Ximeng
Zhang, Fan
He, Guorong
Chen, Yuzhong
author_sort Dong, Chen
collection PubMed
description Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted.
format Online
Article
Text
id pubmed-7570641
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75706412020-10-28 Hardware Trojans in Chips: A Survey for Detection and Prevention Dong, Chen Xu, Yi Liu, Ximeng Zhang, Fan He, Guorong Chen, Yuzhong Sensors (Basel) Review Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted. MDPI 2020-09-10 /pmc/articles/PMC7570641/ /pubmed/32927772 http://dx.doi.org/10.3390/s20185165 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Dong, Chen
Xu, Yi
Liu, Ximeng
Zhang, Fan
He, Guorong
Chen, Yuzhong
Hardware Trojans in Chips: A Survey for Detection and Prevention
title Hardware Trojans in Chips: A Survey for Detection and Prevention
title_full Hardware Trojans in Chips: A Survey for Detection and Prevention
title_fullStr Hardware Trojans in Chips: A Survey for Detection and Prevention
title_full_unstemmed Hardware Trojans in Chips: A Survey for Detection and Prevention
title_short Hardware Trojans in Chips: A Survey for Detection and Prevention
title_sort hardware trojans in chips: a survey for detection and prevention
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570641/
https://www.ncbi.nlm.nih.gov/pubmed/32927772
http://dx.doi.org/10.3390/s20185165
work_keys_str_mv AT dongchen hardwaretrojansinchipsasurveyfordetectionandprevention
AT xuyi hardwaretrojansinchipsasurveyfordetectionandprevention
AT liuximeng hardwaretrojansinchipsasurveyfordetectionandprevention
AT zhangfan hardwaretrojansinchipsasurveyfordetectionandprevention
AT heguorong hardwaretrojansinchipsasurveyfordetectionandprevention
AT chenyuzhong hardwaretrojansinchipsasurveyfordetectionandprevention