{"title":"Trojan security aware DSP IP core and integrated circuits","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_ch3","DOIUrl":null,"url":null,"abstract":"This chapter discusses different security approaches to designing digital signal processing (DSP) cores that have detection capability against functional-type hardware Trojans in a global supply chain. In the current design and fabrication supply chain, design houses, circuits and system core vendors, and manufacturing houses are globally scattered. It is quite possible that Trojans can be inserted in this design and manufacturing supply chain by anyone involved at any phase. Such Trojans can give backdoors to hackers and affect the operation of the system that uses the infected hardware. In a worst case, in critical applications, such as aircrafts and medical devices, functioning can be completely stopped, causing catastrophic consequences.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/PBCS060E_ch3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This chapter discusses different security approaches to designing digital signal processing (DSP) cores that have detection capability against functional-type hardware Trojans in a global supply chain. In the current design and fabrication supply chain, design houses, circuits and system core vendors, and manufacturing houses are globally scattered. It is quite possible that Trojans can be inserted in this design and manufacturing supply chain by anyone involved at any phase. Such Trojans can give backdoors to hackers and affect the operation of the system that uses the infected hardware. In a worst case, in critical applications, such as aircrafts and medical devices, functioning can be completely stopped, causing catastrophic consequences.