Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/5015
Title: | Testing the Effect of Hardware Trojans: A Case Study |
Authors: | Agrawal, Sneh Mukherjee, Shyamapada |
Keywords: | Hardware Trojan FPGA Hardware security |
Issue Date: | Dec-2024 |
Citation: | 12th International Conference on Intelligent Systems and Embedded Design (ISED), NIT Rourkela, India, 20-22nd December 2024 |
Abstract: | While outsourcing fabrication and integrating thirdparty intellectual property has expedited IC development, it has also created substantial hardware attack surfaces, particularly Hardware Trojans (HTs). These harmful IC alterations, which are frequently hidden during design or production, present serious risks like data loss, illegal access, system malfunctions, and disastrous disruptions in vital industries like finance, healthcare, and defense. Due to their covert nature and dependence on uncommon circuit states, which are frequently outside the purview of conventional test sets, HT detection is difficult. Scalability, the lack of golden reference models in IP-based designs, and the adversary’s capacity to target only subsets of ICs are the main drawbacks of the pre-silicon and postsilicon verification techniques currently in use. Noise, ultra-small Trojan sensitivity, and variability in nanoscale processes impede advanced detection methods like side-channel analysis. This study investigates how a hardware Trojan affects a basic mathematical calculation running on a Basys3 FPGA board. When the Trojan is activated, the design—which computes the square of a 4- bit binary number—produces inaccurate results for particular inputs, highlighting the necessity of strong detection systems to guarantee IC security and dependability |
Description: | Copyright belongs to the proceeding publisher. |
URI: | http://hdl.handle.net/2080/5015 |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2024_ISED_SAgrawal_Testing.pdf | 1.91 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.