TY - GEN
T1 - The undetectable and unprovable hardware trojan horse
AU - Wei, Sheng
AU - Potkonjak, Miodrag
PY - 2013
Y1 - 2013
N2 - We have developed an approach for automatic embedding of customizable hardware Trojan horses (HTHs) into an arbitrary finite state machine. The HTH can be used to facilitate a variety of security attacks and does not require any additional gates, because it is morphed into the specified design. Even after the HTH induces provable damage, one is not capable of proving that any malicious circuitry is embedded into the design. The main ramification of the developed HTH is that hardware and system techniques should move from HTH detection toward synthesis for trusted systems.
AB - We have developed an approach for automatic embedding of customizable hardware Trojan horses (HTHs) into an arbitrary finite state machine. The HTH can be used to facilitate a variety of security attacks and does not require any additional gates, because it is morphed into the specified design. Even after the HTH induces provable damage, one is not capable of proving that any malicious circuitry is embedded into the design. The main ramification of the developed HTH is that hardware and system techniques should move from HTH detection toward synthesis for trusted systems.
UR - http://www.scopus.com/inward/record.url?scp=84879858360&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84879858360&partnerID=8YFLogxK
U2 - 10.1145/2463209.2488912
DO - 10.1145/2463209.2488912
M3 - Conference contribution
AN - SCOPUS:84879858360
SN - 9781450320719
T3 - Proceedings - Design Automation Conference
BT - Proceedings of the 50th Annual Design Automation Conference, DAC 2013
T2 - 50th Annual Design Automation Conference, DAC 2013
Y2 - 29 May 2013 through 7 June 2013
ER -