A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of cryptographic engineering 2022-11, Vol.12 (4), p.495-522
Hauptverfasser: Mukherjee, Rijoy, Rajendran, Sree Ranjani, Chakraborty, Rajat Subhra
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 522
container_issue 4
container_start_page 495
container_title Journal of cryptographic engineering
container_volume 12
creator Mukherjee, Rijoy
Rajendran, Sree Ranjani
Chakraborty, Rajat Subhra
description Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.
doi_str_mv 10.1007/s13389-022-00295-w
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2726452333</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2726452333</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-a80d41b559138ee39c54d5f4589de5073e69c43d0e7369f9d57499b9a446b3623</originalsourceid><addsrcrecordid>eNp9kMtqwzAQRUVpoSHND3Ql6Nqtnra1DKEvCHSTroUsjRMHR3IlJyF_Xycu7a6zmRm4985wELqn5JESUjwlynmpMsJYRghTMjteoQmjimSlpPn170zKWzRLqakI54JIWfAJaufYhl0XYQM-NQfAaR8PcMKhxt3mlBprWmy8w21YNxb3kPrGr4duN7752kPCdYj4zUR3NBHwKoat8djBIOib4C_WIfwA_rzeoZvatAlmP32KPl-eV4u3bPnx-r6YLzPLqeozUxInaCWlorwE4MpK4WQtZKkcSFJwyJUV3BEoeK5q5WQhlKqUESKveM74FD2MuV0M5yd7vQ376IeTmhUsF5LxoaaIjSobQ0oRat3FZmfiSVOiz2D1CFYPYPUFrD4OJj6a0iD2a4h_0f-4vgFpTXzW</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2726452333</pqid></control><display><type>article</type><title>A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention</title><source>SpringerNature Journals</source><creator>Mukherjee, Rijoy ; Rajendran, Sree Ranjani ; Chakraborty, Rajat Subhra</creator><creatorcontrib>Mukherjee, Rijoy ; Rajendran, Sree Ranjani ; Chakraborty, Rajat Subhra</creatorcontrib><description>Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.</description><identifier>ISSN: 2190-8508</identifier><identifier>EISSN: 2190-8516</identifier><identifier>DOI: 10.1007/s13389-022-00295-w</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Circuits and Systems ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Cryptology ; Data Structures and Information Theory ; Electronic systems ; Hardware ; Malware ; Networks ; Operating Systems ; Regular Paper ; Taxonomy</subject><ispartof>Journal of cryptographic engineering, 2022-11, Vol.12 (4), p.495-522</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-a80d41b559138ee39c54d5f4589de5073e69c43d0e7369f9d57499b9a446b3623</citedby><cites>FETCH-LOGICAL-c319t-a80d41b559138ee39c54d5f4589de5073e69c43d0e7369f9d57499b9a446b3623</cites><orcidid>0000-0002-8432-3418</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s13389-022-00295-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s13389-022-00295-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Mukherjee, Rijoy</creatorcontrib><creatorcontrib>Rajendran, Sree Ranjani</creatorcontrib><creatorcontrib>Chakraborty, Rajat Subhra</creatorcontrib><title>A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention</title><title>Journal of cryptographic engineering</title><addtitle>J Cryptogr Eng</addtitle><description>Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.</description><subject>Circuits and Systems</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptology</subject><subject>Data Structures and Information Theory</subject><subject>Electronic systems</subject><subject>Hardware</subject><subject>Malware</subject><subject>Networks</subject><subject>Operating Systems</subject><subject>Regular Paper</subject><subject>Taxonomy</subject><issn>2190-8508</issn><issn>2190-8516</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kMtqwzAQRUVpoSHND3Ql6Nqtnra1DKEvCHSTroUsjRMHR3IlJyF_Xycu7a6zmRm4985wELqn5JESUjwlynmpMsJYRghTMjteoQmjimSlpPn170zKWzRLqakI54JIWfAJaufYhl0XYQM-NQfAaR8PcMKhxt3mlBprWmy8w21YNxb3kPrGr4duN7752kPCdYj4zUR3NBHwKoat8djBIOib4C_WIfwA_rzeoZvatAlmP32KPl-eV4u3bPnx-r6YLzPLqeozUxInaCWlorwE4MpK4WQtZKkcSFJwyJUV3BEoeK5q5WQhlKqUESKveM74FD2MuV0M5yd7vQ376IeTmhUsF5LxoaaIjSobQ0oRat3FZmfiSVOiz2D1CFYPYPUFrD4OJj6a0iD2a4h_0f-4vgFpTXzW</recordid><startdate>20221101</startdate><enddate>20221101</enddate><creator>Mukherjee, Rijoy</creator><creator>Rajendran, Sree Ranjani</creator><creator>Chakraborty, Rajat Subhra</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-8432-3418</orcidid></search><sort><creationdate>20221101</creationdate><title>A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention</title><author>Mukherjee, Rijoy ; Rajendran, Sree Ranjani ; Chakraborty, Rajat Subhra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-a80d41b559138ee39c54d5f4589de5073e69c43d0e7369f9d57499b9a446b3623</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Circuits and Systems</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptology</topic><topic>Data Structures and Information Theory</topic><topic>Electronic systems</topic><topic>Hardware</topic><topic>Malware</topic><topic>Networks</topic><topic>Operating Systems</topic><topic>Regular Paper</topic><topic>Taxonomy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mukherjee, Rijoy</creatorcontrib><creatorcontrib>Rajendran, Sree Ranjani</creatorcontrib><creatorcontrib>Chakraborty, Rajat Subhra</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of cryptographic engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mukherjee, Rijoy</au><au>Rajendran, Sree Ranjani</au><au>Chakraborty, Rajat Subhra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention</atitle><jtitle>Journal of cryptographic engineering</jtitle><stitle>J Cryptogr Eng</stitle><date>2022-11-01</date><risdate>2022</risdate><volume>12</volume><issue>4</issue><spage>495</spage><epage>522</epage><pages>495-522</pages><issn>2190-8508</issn><eissn>2190-8516</eissn><abstract>Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s13389-022-00295-w</doi><tpages>28</tpages><orcidid>https://orcid.org/0000-0002-8432-3418</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2190-8508
ispartof Journal of cryptographic engineering, 2022-11, Vol.12 (4), p.495-522
issn 2190-8508
2190-8516
language eng
recordid cdi_proquest_journals_2726452333
source SpringerNature Journals
subjects Circuits and Systems
Communications Engineering
Computer Communication Networks
Computer Science
Cryptology
Data Structures and Information Theory
Electronic systems
Hardware
Malware
Networks
Operating Systems
Regular Paper
Taxonomy
title A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T22%3A11%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20comprehensive%20survey%20of%20physical%20and%20logic%20testing%20techniques%20for%20Hardware%20Trojan%20detection%20and%20prevention&rft.jtitle=Journal%20of%20cryptographic%20engineering&rft.au=Mukherjee,%20Rijoy&rft.date=2022-11-01&rft.volume=12&rft.issue=4&rft.spage=495&rft.epage=522&rft.pages=495-522&rft.issn=2190-8508&rft.eissn=2190-8516&rft_id=info:doi/10.1007/s13389-022-00295-w&rft_dat=%3Cproquest_cross%3E2726452333%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2726452333&rft_id=info:pmid/&rfr_iscdi=true