The undetectable and unprovable hardware trojan horse

Sheng Wei, Miodrag Potkonjak

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations


We have developed an approach for automatic embedding of customizable hardware Trojan horses (HTHs) into an arbitrary finite state machine. The HTH can be used to facilitate a variety of security attacks and does not require any additional gates, because it is morphed into the specified design. Even after the HTH induces provable damage, one is not capable of proving that any malicious circuitry is embedded into the design. The main ramification of the developed HTH is that hardware and system techniques should move from HTH detection toward synthesis for trusted systems.

Original languageEnglish (US)
Title of host publicationProceedings of the 50th Annual Design Automation Conference, DAC 2013
StatePublished - 2013
Externally publishedYes
Event50th Annual Design Automation Conference, DAC 2013 - Austin, TX, United States
Duration: May 29 2013Jun 7 2013

Publication series

NameProceedings - Design Automation Conference
ISSN (Print)0738-100X


Other50th Annual Design Automation Conference, DAC 2013
Country/TerritoryUnited States
CityAustin, TX

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modeling and Simulation


Dive into the research topics of 'The undetectable and unprovable hardware trojan horse'. Together they form a unique fingerprint.

Cite this