Design, Implementation and Detection of Hardware Trojans in Sequential systems
L.K.Hema1, S.A.V. Satya Murty2, Vijayan Sugumaran3
1Dr.L.K. Hema, Dept. of ECE, Aarupadai Veedu Institute Of Technology, Vinayaka Mission’s Research Foundation, chennai, India.
2Dr. S.A.V. Satya Murty, Aarupadai Veedu Institute Of Technology, Vinayaka Mission’s Research Foundation, chennai, India.
3Dr. Vijayan Sugumaran, Department of Decision and Information Sciences School of Business Administration Oakland University, Rochester.
Manuscript received on November 20, 2019. | Revised Manuscript received on November 26, 2019. | Manuscript published on 30 November, 2019. | PP: 3665-3670 | Volume-8 Issue-4, November 2019. | Retrieval Number: D7893118419/2019©BEIESP | DOI: 10.35940/ijrte.D7893.118419
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: For decades, digital systems have been designed based on assumptions that the underlying hardware, though not perfectly reliable, is free of malicious elements. The demand for IC’s is greatly increasing due to tremendous technological development. Without appropriate resources the companies are hard pressed to produce trusted IC’s. This is driving the companies into the ‘fabless’ trend predominant in semi-conductor industry, where the companies are depending on cheaper foundries for the IC fabrication instead of depending on their own resources. This growth brings with it a big rise in threat level in terms of Hardware Trojans that hits the manufacturing companies which make use of Integrated Circuits. This transcends many industries, including strategic organizations and telecommunication companies, mobile phones and computers, embedded systems used in domestic applications and health care equipment. These adversarial inclusions are generally triggered to do malicious modifications in the end user system by the intruder, which is difficult to detect in their quiescent state. This paper focuses on understanding Hardware Trojans, their implications and detection methodologies. It is extremely important for all industries and more so for defense organizations, who are involved in developing systems to protect the nation’s boundaries.
Keywords: Hardware Trojans, Reverse Engineering, sequential, Side Channel Analysis, Trigger.
Scope of the Article: Sequential, Parallel and Distributed Algorithms and Data Structures.