首页> 外文会议>IEEE Pulsed Power Conference >Exploiting Hardware Obfuscation Methods to Prevent and Detect Hardware Trojans
【24h】

Exploiting Hardware Obfuscation Methods to Prevent and Detect Hardware Trojans

机译:利用硬件混淆方法,以防止和检测硬件特洛伊木马

获取原文

摘要

Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated as a promising technique to strengthen hardware implementation against hard-ware Trojan insertion in the late stage of the supply chain. This work reviews the state-of-the-art hardware obfuscation methods, with the special emphasis on the corresponding efforts made for hardware Trojan prevention and detection. Furthermore, we summarize the evaluation metrics utilized in literature to assess the effectiveness of hardware obfuscation methods. Future directions for hardware obfuscation against hardware Trojans are discussed in this work, as well.
机译:由于全球化的半导体供应链,集成电路遭受硬件安全攻击。在各种攻击中,硬件特洛伊木马插入已成为主要的安全问题。对手改变原始电路通过硬件特洛伊木马实现恶意意图。硬件混淆已被证明是一种有希望的技术,以加强对供应链的后期硬件木马插入的硬件实现。这项工作审查了最先进的硬件混淆方法,特别强调了对硬件木马预防和检测的相应努力。此外,我们总结了文献中使用的评估指标,以评估硬件混淆方法的有效性。在这项工作中,还讨论了对硬件特洛伊木马的硬件混淆的未来方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号