Hardware Trojan Detection and Mitigation
Driven by the rising cost and complexity of integrated circuit (IC) fabrication, the semiconductor industry has become increasingly reliant on unaffiliated and untrusted entities for IC production. These untrusted entities are capable of inserting malicious hardware, known as hardware trojans, within an IC during fabrication. These malicious modifications can serve a wide variety of purposes including malfunctions in the field, lower reliability, confidential data leakage, and system destruction in specific conditions. They are also quite pernicious as they are difficult to detect with standard functional verification procedures and can often bypass software-implemented security. Therefore, hardware trojans are a massive security risk, especially for security-critical applications. <p>