ABSTRACT

The horizontal business model becoming prominent in recent years in semiconductor design and manufacturing, has relinquished the control that IC design houses had over the design and manufacture of ICs, thus making them vulnerable to different security attacks. Fig. 13.1 illustrates the level of trust at different steps of a typical IC life-cycle [107]. Each party associated with the design and manufacture of an IC can be a potential adversary who inserts malicious modifications, referred as hardware Trojans [17]. Concern about this vulnerability of ICs and the resultant compromise of security has been expressed globally [109, 36], especially since several unexplained military mishaps are attributed to the presence of malicious hardware Trojans [17, 199].