Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/5015
Title: Testing the Effect of Hardware Trojans: A Case Study
Authors: Agrawal, Sneh
Mukherjee, Shyamapada
Keywords: Hardware Trojan
FPGA
Hardware security
Issue Date: Dec-2024
Citation: 12th International Conference on Intelligent Systems and Embedded Design (ISED), NIT Rourkela, India, 20-22nd December 2024
Abstract: While outsourcing fabrication and integrating thirdparty intellectual property has expedited IC development, it has also created substantial hardware attack surfaces, particularly Hardware Trojans (HTs). These harmful IC alterations, which are frequently hidden during design or production, present serious risks like data loss, illegal access, system malfunctions, and disastrous disruptions in vital industries like finance, healthcare, and defense. Due to their covert nature and dependence on uncommon circuit states, which are frequently outside the purview of conventional test sets, HT detection is difficult. Scalability, the lack of golden reference models in IP-based designs, and the adversary’s capacity to target only subsets of ICs are the main drawbacks of the pre-silicon and postsilicon verification techniques currently in use. Noise, ultra-small Trojan sensitivity, and variability in nanoscale processes impede advanced detection methods like side-channel analysis. This study investigates how a hardware Trojan affects a basic mathematical calculation running on a Basys3 FPGA board. When the Trojan is activated, the design—which computes the square of a 4- bit binary number—produces inaccurate results for particular inputs, highlighting the necessity of strong detection systems to guarantee IC security and dependability
Description: Copyright belongs to the proceeding publisher.
URI: http://hdl.handle.net/2080/5015
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2024_ISED_SAgrawal_Testing.pdf1.91 MBAdobe PDFView/Open    Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.