doi: 10.7873/DATE.2015.1101
Introduction to Hardware Trojan Detection Methods
Julien Francq1 and Florian Frick2
1Airbus Defence & Space - CyberSecurity, 1 Bd Jean Moulin, CS, MetaPole, Elancourt Cedex, France.
Julien.Francq@cassidian.com
2
University of Stuttgart,
Institute for Control Engineering of
Machine Tools and Manufacturing Units (ISW),
Seidenstrasse 36,
D-70174 Stuttgart,
Germany.
Florian.Frick@isw.uni-stuttgart.de
ABSTRACT
Hardware Trojans (HTs) are identified as an emerging
threat for the integrity of Integrated Circuits (ICs) and
their applications. Attackers attempt to maliciously manipulate
the functionality of ICs by inserting HTs, potentially causing
disastrous effects (Denial of Service, sensitive information leakage,
etc.). Over the last 10 years, various methods have been
proposed in literature to circumvent HTs. This article introduces
the general context of HTs and summarizes the recent advances
in HT detection from a French funded research project named
HOMERE. Some of these results will be detailed in the related
special session.
Full Text (PDF)
|