@inproceedings{9acbd83353ec4cc8b97d779c67c57c89,
title = "Advancing the state-of-the-art in hardware Trojans design",
abstract = "{\textcopyright} 2017 IEEE.Electronic Design Automation (EDA) industry heavily reuses third party IP cores which are vulnerable to insertion of Hardware Trojans (HTs) at design time by third party IP core providers. State of the art research has shown that existing HT detection techniques, which claim to detect all publicly available HT benchmarks, can still be defeated by carefully designing new sophisticated HTs. The reason being that these techniques consider the HT landscape to be limited only to the publicly known HT benchmarks. However the adversary is not limited to these HTs and may devise new HT design principles to bypass these countermeasures. In this paper, we discover certain crucial properties of trigger activated HTs which lead to the definition of an exponentially large class of Deterministic Hardware Trojans HD that an adversary can (but is not limited to) design. The discovered properties serve as HT design principles which help us understand the tremendous ways available to an adversary to design a HT, and show that the existing publicly known HT benchmarks are just the tip of the iceberg on this huge landscape.",
author = "S.K. Haider and C. Jin and {Van Dijk}, M.",
year = "2017",
month = sep,
day = "27",
doi = "10.1109/MWSCAS.2017.8053050",
language = "English",
series = "Midwest Symposium on Circuits and Systems",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "823--826",
booktitle = "2017 IEEE 60th International Midwest Symposium on Circuits and Systems, MWSCAS 2017",
address = "United States",
note = "60th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2017 ; Conference date: 06-08-2017 Through 09-08-2017",
}