M12 All You Need to Know About Hardware Trojans and Counterfeit Ics

Printer-friendly versionPDF version
Location / Room: 
Konferenz 5


Mohammad Tehranipoor, University of Connecticut, US (Contact Mohammad Tehranipoor)
Domenic Forte, University of Connecticut, US (Contact Domenic Forte)


The migration from a vertical to horizontal business model has made it easier to introduce hardware Trojans and counterfeit electronic parts into the electronic component supply chain. Hardware Trojans are malicious modifications made to original IC designs that reduce system integrity (change functionality, leak private data, etc.). Counterfeit parts are often below specification and/or of substandard quality. The existence of Trojans and counterfeit parts creates risks for the life-critical systems and infrastructures that incorporate them including automotive, aerospace, military, and medical systems. In this tutorial, we will cover (i) Background and motivation for hardware Trojan and counterfeit prevention/detection; (ii) Taxonomies related to both topics; (iii) Existing solutions; (iv) Open challenges; (v) New and unified solutions to address these challenges.



14:30M12.1Session 1
00:00M12.1.1Background and motivation for hardware Trojan and counterfeit prevention/detection

00:00M12.1.2Taxonomies related to both topics

16:30M12.2Session 2
00:00M12.2.1Existing solutions

00:00M12.2.2Open challenges

00:00M12.2.3New and unified solutions to address these challenges