Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 18, Pages: 1-9
Bazzazi Amin1*, Manzuri Shalmani Mohammad Taghi2 and Hemmattyar Ali Mohammad Afshin2
1Department of Computer Engineering, Computer Faculty, Sharif University of Technology, International Campus, Kish Island, Iran; [email protected] 2Department of Computer Engineering, Computer Faculty, Sharif University of Technology, Tehran, Iran; [email protected], [email protected]
*Author for correspondence
Department of Computer Engineering, Computer Faculty, Sharif University of Technology, International Campus, Kish Island, Iran; [email protected]
The widespread expansion of the semiconductor industry and various production phases have led to the increased importance of fabricating highly secure chips. Both in factories manufacturing and later at actual operation, digital integrated circuits (IC) might encounter a variety of hardware attacks, one type of which involves Hardware Trojans (HT). Due to their diversity, it has become a major hardware security challenge to prevent, detect and track down HTs. In this regard, the first step is to understand the taxonomy of Trojans and the current ways in which they can be encountered. For that purpose, certain classifications are required. With their downsized dimensions, the Trojans have become extremely difficult to detect, thus promoting the employment of consolidated detection methods. It is, therefore, useful for users to establish an appropriate classification of various Trojans and detection methods. Since the most ideal strategy to tackle the Trojan problem is to understand their taxonomy and counterattack techniques, it seems crucial to establish a classification entailing a wide variety of methods. Therefore, a new classification was proposed in this paper as an ideal user guideline, covering the entire anti-Trojan methods in two categories, i.e. prevention and detection. The users can, at any operating stage whether before or after the HT attack, take an appropriate measure to address the Trojan threat through selecting a correct solution.
Keywords: Classification, Hardware Trojans, Hardware Security, HT Prevention and Detection Methods
Subscribe now for latest articles and news.