Trojans in Early Design Steps—An Emerging Threat

Cita com:
hdl:2117/99414
Document typeConference report
Defense date2016-11-16
Rights accessOpen Access
This work is protected by the corresponding intellectual and industrial property rights.
Except where otherwise noted, its contents are licensed under a Creative Commons license
:
Attribution-NonCommercial-NoDerivs 3.0 Spain
Abstract
Hardware Trojans inserted by malicious foundries
during integrated circuit manufacturing have received substantial
attention in recent years. In this paper, we focus on a different
type of hardware Trojan threats: attacks in the early steps of
design process. We show that third-party intellectual property
cores and CAD tools constitute realistic attack surfaces and that
even system specification can be targeted by adversaries. We
discuss the devastating damage potential of such attacks, the
applicable countermeasures against them and their deficiencies.
Files | Description | Size | Format | View |
---|---|---|---|---|
FCTRU_2016_55_Trojans_in_Early.pdf | 654,8Kb | View/Open |