Survey of Hardware Trojan Horse Detection on Chip

Wang Chenxu,Jiang Peihe,Yu Mingyan
DOI: https://doi.org/10.3969/j.issn.1003-353x.2012.05.003
2012-01-01
Abstract:The integrated circuit(IC)plays an important role in many fields,but the Hardware Trojan Horse(HTH)can be maliciously implanted into ICs by attackers because of separated IC design and fabrication mode.The existence of HTH threatens the information security.HTH detection begins to attract widely attention and comes into a new research field.Firstly,the concept of HTH,its hazards and its classification were described.Then some important researches on HTH detection approach were summarized.The researchers focus on side channel analysis detection,in which the power finger analysis techniques are the promising method to detect HTH.Finally,the proactive defense mechanisms of HTH were also summed up briefly.
What problem does this paper attempt to address?