A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The i...
Gespeichert in:
Veröffentlicht in: | Journal of cryptographic engineering 2022-11, Vol.12 (4), p.495-522 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 522 |
---|---|
container_issue | 4 |
container_start_page | 495 |
container_title | Journal of cryptographic engineering |
container_volume | 12 |
creator | Mukherjee, Rijoy Rajendran, Sree Ranjani Chakraborty, Rajat Subhra |
description | Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research. |
doi_str_mv | 10.1007/s13389-022-00295-w |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2726452333</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2726452333</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-a80d41b559138ee39c54d5f4589de5073e69c43d0e7369f9d57499b9a446b3623</originalsourceid><addsrcrecordid>eNp9kMtqwzAQRUVpoSHND3Ql6Nqtnra1DKEvCHSTroUsjRMHR3IlJyF_Xycu7a6zmRm4985wELqn5JESUjwlynmpMsJYRghTMjteoQmjimSlpPn170zKWzRLqakI54JIWfAJaufYhl0XYQM-NQfAaR8PcMKhxt3mlBprWmy8w21YNxb3kPrGr4duN7752kPCdYj4zUR3NBHwKoat8djBIOib4C_WIfwA_rzeoZvatAlmP32KPl-eV4u3bPnx-r6YLzPLqeozUxInaCWlorwE4MpK4WQtZKkcSFJwyJUV3BEoeK5q5WQhlKqUESKveM74FD2MuV0M5yd7vQ376IeTmhUsF5LxoaaIjSobQ0oRat3FZmfiSVOiz2D1CFYPYPUFrD4OJj6a0iD2a4h_0f-4vgFpTXzW</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2726452333</pqid></control><display><type>article</type><title>A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention</title><source>SpringerNature Journals</source><creator>Mukherjee, Rijoy ; Rajendran, Sree Ranjani ; Chakraborty, Rajat Subhra</creator><creatorcontrib>Mukherjee, Rijoy ; Rajendran, Sree Ranjani ; Chakraborty, Rajat Subhra</creatorcontrib><description>Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.</description><identifier>ISSN: 2190-8508</identifier><identifier>EISSN: 2190-8516</identifier><identifier>DOI: 10.1007/s13389-022-00295-w</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Circuits and Systems ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Cryptology ; Data Structures and Information Theory ; Electronic systems ; Hardware ; Malware ; Networks ; Operating Systems ; Regular Paper ; Taxonomy</subject><ispartof>Journal of cryptographic engineering, 2022-11, Vol.12 (4), p.495-522</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-a80d41b559138ee39c54d5f4589de5073e69c43d0e7369f9d57499b9a446b3623</citedby><cites>FETCH-LOGICAL-c319t-a80d41b559138ee39c54d5f4589de5073e69c43d0e7369f9d57499b9a446b3623</cites><orcidid>0000-0002-8432-3418</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s13389-022-00295-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s13389-022-00295-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Mukherjee, Rijoy</creatorcontrib><creatorcontrib>Rajendran, Sree Ranjani</creatorcontrib><creatorcontrib>Chakraborty, Rajat Subhra</creatorcontrib><title>A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention</title><title>Journal of cryptographic engineering</title><addtitle>J Cryptogr Eng</addtitle><description>Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.</description><subject>Circuits and Systems</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptology</subject><subject>Data Structures and Information Theory</subject><subject>Electronic systems</subject><subject>Hardware</subject><subject>Malware</subject><subject>Networks</subject><subject>Operating Systems</subject><subject>Regular Paper</subject><subject>Taxonomy</subject><issn>2190-8508</issn><issn>2190-8516</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kMtqwzAQRUVpoSHND3Ql6Nqtnra1DKEvCHSTroUsjRMHR3IlJyF_Xycu7a6zmRm4985wELqn5JESUjwlynmpMsJYRghTMjteoQmjimSlpPn170zKWzRLqakI54JIWfAJaufYhl0XYQM-NQfAaR8PcMKhxt3mlBprWmy8w21YNxb3kPrGr4duN7752kPCdYj4zUR3NBHwKoat8djBIOib4C_WIfwA_rzeoZvatAlmP32KPl-eV4u3bPnx-r6YLzPLqeozUxInaCWlorwE4MpK4WQtZKkcSFJwyJUV3BEoeK5q5WQhlKqUESKveM74FD2MuV0M5yd7vQ376IeTmhUsF5LxoaaIjSobQ0oRat3FZmfiSVOiz2D1CFYPYPUFrD4OJj6a0iD2a4h_0f-4vgFpTXzW</recordid><startdate>20221101</startdate><enddate>20221101</enddate><creator>Mukherjee, Rijoy</creator><creator>Rajendran, Sree Ranjani</creator><creator>Chakraborty, Rajat Subhra</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-8432-3418</orcidid></search><sort><creationdate>20221101</creationdate><title>A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention</title><author>Mukherjee, Rijoy ; Rajendran, Sree Ranjani ; Chakraborty, Rajat Subhra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-a80d41b559138ee39c54d5f4589de5073e69c43d0e7369f9d57499b9a446b3623</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Circuits and Systems</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptology</topic><topic>Data Structures and Information Theory</topic><topic>Electronic systems</topic><topic>Hardware</topic><topic>Malware</topic><topic>Networks</topic><topic>Operating Systems</topic><topic>Regular Paper</topic><topic>Taxonomy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mukherjee, Rijoy</creatorcontrib><creatorcontrib>Rajendran, Sree Ranjani</creatorcontrib><creatorcontrib>Chakraborty, Rajat Subhra</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of cryptographic engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mukherjee, Rijoy</au><au>Rajendran, Sree Ranjani</au><au>Chakraborty, Rajat Subhra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention</atitle><jtitle>Journal of cryptographic engineering</jtitle><stitle>J Cryptogr Eng</stitle><date>2022-11-01</date><risdate>2022</risdate><volume>12</volume><issue>4</issue><spage>495</spage><epage>522</epage><pages>495-522</pages><issn>2190-8508</issn><eissn>2190-8516</eissn><abstract>Hardware Trojans have emerged as a great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state of the art of post-silicon testing techniques for Hardware Trojan detection, with our coverage including both physical measurement-based testing, as well as logic testing. We present systematic classification of Hardware Trojans and a taxonomy of detection techniques based on physical and logical testing, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s13389-022-00295-w</doi><tpages>28</tpages><orcidid>https://orcid.org/0000-0002-8432-3418</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2190-8508 |
ispartof | Journal of cryptographic engineering, 2022-11, Vol.12 (4), p.495-522 |
issn | 2190-8508 2190-8516 |
language | eng |
recordid | cdi_proquest_journals_2726452333 |
source | SpringerNature Journals |
subjects | Circuits and Systems Communications Engineering Computer Communication Networks Computer Science Cryptology Data Structures and Information Theory Electronic systems Hardware Malware Networks Operating Systems Regular Paper Taxonomy |
title | A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T22%3A11%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20comprehensive%20survey%20of%20physical%20and%20logic%20testing%20techniques%20for%20Hardware%20Trojan%20detection%20and%20prevention&rft.jtitle=Journal%20of%20cryptographic%20engineering&rft.au=Mukherjee,%20Rijoy&rft.date=2022-11-01&rft.volume=12&rft.issue=4&rft.spage=495&rft.epage=522&rft.pages=495-522&rft.issn=2190-8508&rft.eissn=2190-8516&rft_id=info:doi/10.1007/s13389-022-00295-w&rft_dat=%3Cproquest_cross%3E2726452333%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2726452333&rft_id=info:pmid/&rfr_iscdi=true |