Skip to content
Related Articles

Related Articles

Hardware Trojan

View Discussion
Improve Article
Save Article
Like Article
  • Last Updated : 07 May, 2021

In Terms of Hardware security, It is a malicious modification of the circuitry of an IC chip. It is done during the design or fabrication of chip (i.e. The chip is modified without the possible knowledge of the person who designed it. )

It is sometimes also known as ‘HT’. A Hardware Trojan or HT is something, a piece of hardware, which is hiding inside another larger piece of hardware. It wakes up at an unpredictable times and does something which is again unpredictable with respect to user. 

A Hardware Trojan (HT) is categorized by two things – 

  1. Physical Representation (i.e. how it behaves, how it looks like)
  2. It’s behavior (i.e. how it shows up and what are its effects)

Properties of a Hardware Trojan –

  1. It can take place pre or post manufacturing.
  2. It is inserted by some intellectual adversary.
  3. It is extremely small hardware overhead.
  4. It is Stealthy and nearly Impossible to detect
  5. It causes IC to malfunction in-field.

Affects if a Hardware Trojan if it’s placed inside a chip –

  1. Potentially disastrous consequences.
  2. Loss of human life or property.

Whenever the HT wakes up , the entire activity that the Trojan performs or executes is known as payload.

Components of a Hardware Trojan

It contains a trigger and a payload

  1. Trigger – Trigger decides when the Hardware Trojan or HT will wake up and
  2. Payload – Payload decides what will happen when the Trojan will wake up.

(a) A Typical Circuit

(b) A Hardware Trojan

(c) A Maliciously Modified Circuit

It is maliciously placed in the original circuit. User doesn’t know about this because most of the time circuit will behave normally, but sometimes it behaves unpredictably / maliciously whenever it wakes up. As shown in the above diagrams.

Reasons why it might get inserted into a chip

  1. Prevalence of IP(Intellectual Property Core) based design.
  2. Routine use of CAD tools for EDA Vendors.
  3. Fabless manufacturing model (i.e. We do not design it ourselves we give someone to design it, there might something happen)
  4. Loss of control over design and manufacture, etc.

Do Hardware Trojan Really Exists ?

  1. No Concrete proof of Hardware Trojan is obtained as yet.
  2. Tampering masks in fab is not easy, it is a complex process.
  3. Reverse engineering of a single IC can take months

But there are some evidences that they do exist –

  1. Numerous suspect military / commercial cases (as early as 1976!!)
  2. Reverse engineering of IC’s is believed to be widely performed by reputed Companies (IBM has patents )

My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!