Literature Review of Hardware Trojans for Side Channel Attack and Detection Techniques

M. Mubdya Barry Sahya
Sekolah Tinggi Sandi Negara Bogor, Indonesia
Amiruddin Amiruddin
Sekolah Tinggi Sandi Negara Bogor, Indonesia








Abstract

The theory of destruction of important infrastructure such as electricity, transportation and manufacturing facilities, has long been studied and developed. Such attacks are often called side channel attacks. One way to carry out such attacks is to use a hardware Trojan utilizing Integrated Circuit (IC) on a system to drain electricity or memory and hinder the system performance. This paper presents the result of a review of several hardware Trojan attack models and their detection methods that can be used as reference material for designing detection-resistant hardware Trojans as well as designing effective and efficient hardware Trojan detection methods.




Download Paper
PDF

Publication Date

27/11/2018


ISBN

978-602-53524-0-9


Copyright


© The authors.
This article is distributed under the terms of the Creative Commons Attribution License 4.0, which permits non-commercial use, distribution and reproduction in any medium, provided the original work is properly cited. See for details: https://creativecommons.org/licenses/by-nc/4.0/


RSS Feed
Feed

Download Paper

463 times.


Share




Proceeding The 2nd International Conference on Informatics for Development
27 November 2018
ISBN 978-602-53524-0-9
Open Access