000 06107nam a2200781 i 4500
001 6813206
003 IEEE
005 20200413152911.0
006 m eo d
007 cr cn |||m|||a
008 131016s2013 caua foab 000 0 eng d
020 _a9781627052528
_qelectronic bk.
020 _z9781627052511
_qpbk.
024 7 _a10.2200/S00530ED1V01Y201308SPT006
_2doi
035 _a(CaBNVSL)swl00402796
035 _a(OCoLC)860909294
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aQA76.76.C68
_bK754 2013
082 0 4 _a005.8
_223
090 _a
_bMoCl
_e201308SPT006
100 1 _aKrieg, Christian.,
_eauthor.
245 1 0 _aHardware malware /
_cChristian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl.
264 1 _aSan Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
_bMorgan & Claypool,
_c2013.
300 _a1 PDF (xi, 103 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aSynthesis lectures on information security, privacy, and trust,
_x1945-9750 ;
_v# 6
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat Reader.
500 _aPart of: Synthesis digital library of engineering and computer science.
500 _aSeries from website.
504 _aIncludes bibliographical references (pages 91-100).
505 0 _a1. Introduction -- 1.1 Motivation -- 1.2 Background -- 1.3 Production process of hardware systems -- 1.3.1 Workflow -- 1.3.2 Vulnerabilities --
505 8 _a2. Hardware Trojans -- 2.1 Components -- 2.1.1 Triggers -- 2.1.2 Payload -- 2.1.3 Interfaces -- 2.2 Types -- 2.3 Attack parameters -- 2.3.1 Level of abstraction -- 2.3.2 Technology domain -- 2.3.3 Target technology -- 2.3.4 Injection phase -- 2.3.5 Attackers -- 2.3.6 Topology -- 2.4 Metrics -- 2.4.1 Structural complexity -- 2.4.2 Impacts -- 2.4.3 Attack probability -- 2.4.4 Activation probability -- 2.4.5 Implementation costs -- 2.4.6 Detection costs --
505 8 _a3. Countermeasures -- 3.1 Introduction and challenges -- 3.2 Detection -- 3.2.1 Formal verification -- 3.2.2 Simulation -- 3.2.3 Logic testing -- 3.2.4 Side-channel analysis -- 3.2.5 Invasion -- 3.3 Localization -- 3.3.1 Activation -- 3.3.2 Mensuration -- 3.3.3 Calculation -- 3.4 Prevention -- 3.4.1 Obfuscation -- 3.4.2 Invasion -- 3.5 Circumventing Trojan countermeasures --
505 8 _a4. Historical overview -- 4.1 Hardware Trojans: the beginnings (2005-2008) -- 4.2 Hardware Trojans: a flood of research (2009-2010) -- 4.3 A reflection on current approaches (2011-2012) --
505 8 _a5. Hot topics and conclusions -- 5.1 Hot topics in hardware security and trust -- 5.2 Conclusions --
505 8 _aGlossary -- Bibliography -- Authors' biographies.
506 1 _aAbstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0 _aCompendex
510 0 _aINSPEC
510 0 _aGoogle scholar
510 0 _aGoogle book search
520 3 _aIn our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.
530 _aAlso available in print.
588 _aTitle from PDF title page (viewed on October 16, 2013).
650 0 _aHardware Trojans (Computers)
650 0 _aComputer viruses.
653 _ahardware Trojan
653 _ahardware security
653 _alogic testing
653 _aformal verification
653 _aside-channel analysis
653 _ahardware Trojan taxonomy
653 _aattacker taxonomy
653 _aattack taxonomy
653 _acounter-measures taxonomy
700 1 _aDabrowski, Adrian.,
_eauthor.
700 1 _aHobel, Heidelinde.,
_eauthor.
700 1 _aKrombholz, Katharina.,
_eauthor.
700 1 _aWeippl, Edgar R.,
_eauthor.
776 0 8 _iPrint version:
_z9781627052511
830 0 _aSynthesis digital library of engineering and computer science.
830 0 _aSynthesis lectures on information security, privacy, and trust ;
_v# 6.
_x1945-9750
856 4 2 _3Abstract with links to resource
_uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=6813206
856 4 0 _3Abstract with links to full text
_uhttp://dx.doi.org/10.2200/S00530ED1V01Y201308SPT006
999 _c562023
_d562023