Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans

Journal Article · · IEEE Access

The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs. This has resulted in a significant corpus of hardware Trojan research including Trojan design and benchmarking efforts and development of corresponding metrics and detection and prevention techniques, over the last two decades. In this survey, we first highlight efforts in Trojan design and benchmarking, followed by a cataloging of seminal and recent works in Trojan detection and prevention and their accompanied metrics. Given the volume of literature in this field, this survey considers only pre-silicon techniques. We make this distinction between pre- and post-silicon to properly scope and provide appropriate context into the capabilities of existing hardware Trojan literature. Each major section (design, prevention, and detection) is accompanied by insights, and common pitfalls, which we highlight can be addressed by future research.

Research Organization:
Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE National Nuclear Security Administration (NNSA)
Grant/Contract Number:
NA0003525
OSTI ID:
2554136
Report Number(s):
SAND--2025-04358J
Journal Information:
IEEE Access, Journal Name: IEEE Access Vol. 13; ISSN 2169-3536
Publisher:
IEEECopyright Statement
Country of Publication:
United States
Language:
English

References (201)

Remote Activation of Hardware Trojans via a Covert Temperature Channel book January 2015
Hardware IP Security and Trust book January 2017
Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip book January 2017
The Hardware Trojan War book January 2018
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software book January 2011
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability conference January 2015
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation journal October 2011
Hardware Trojan Detection Based on Logical Testing journal June 2017
Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing journal July 2018
An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size journal December 2019
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier journal August 2021
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection journal March 2024
Benchmarking of Hardware Trojans and Maliciously Affected Circuits journal March 2017
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods journal February 2018
Targeted modification of hardware trojans journal March 2019
EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration journal December 2023
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection journal September 2018
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels journal June 2021
Ten years of hardware Trojans: a survey from the attacker's perspective journal September 2020
Coverage metrics for functional validation of hardware designs journal January 2001
Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method journal January 2019
A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges journal January 2020
An Unsupervised Detection Approach for Hardware Trojans journal January 2020
A Survey on Split Manufacturing: Attacks, Defenses, and Challenges journal January 2020
Netlist reverse engineering for high-level functionality reconstruction conference January 2016
Trojan localization using symbolic algebra conference January 2017
Detecting hardware Trojans in unspecified functionality through solving satisfiability problems conference January 2017
ASAX: Automatic security assertion extraction for detecting Hardware Trojans conference January 2018
HLIFT: A high-level information flow tracking method for detecting hardware Trojans conference January 2018
System-on-chip security architecture and CAD framework for hardware patch conference January 2018
Detecting RTL Trojans using Artificial Immune Systems and High Level Behavior Classification conference December 2018
Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks conference December 2019
A Formal Framework for Gate- Level Information Leakage Using Z3 conference December 2020
Hardware Trojans Detection Through RTL Features Extraction and Machine Learning conference December 2021
EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security conference December 2022
A Machine Learning Based Automatic Hardware Trojan Attack Space Exploration and Benchmarking Framework conference December 2022
Analysis of Hardware Trojan Resilience Enabled through Logic Locking conference December 2022
RELIC-FUN: Logic Identification through Functional Signal Comparisons conference July 2020
GDSII-Guard: ECO Anti-Trojan Optimization with Exploratory Timing-Security Trade-Offs conference July 2023
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme conference March 2008
A Benchmark Suite of RT-level Hardware Trojans for Pipelined Microprocessor Cores conference April 2021
Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level conference October 2013
EnSAFe: Enabling Sustainable SoC Security Auditing using eFPGA-based Accelerators conference October 2023
Hardware Trojan Prevention Through Limiting Access to the Active Region
  • Supon, Tareq Muhammad; Seyedbarhagh, Mahsasadat; Rashidzadeh, Rashid
  • 2019 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS) https://doi.org/10.1109/DTIS.2019.8735085
conference April 2019
Exploiting sub-graph isomorphism and probabilistic neural networks for the detection of hardware Trojans at RTL conference October 2017
Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores conference December 2021
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip conference September 2019
New design strategy for improving hardware Trojan detection and reducing Trojan activation time conference January 2009
ODETTE: A non-scan design-for-test methodology for Trojan detection in ICs conference June 2011
On hardware Trojan design and implementation at register-transfer level conference June 2013
Malicious circuitry detection using fast timing characterization via test points conference June 2013
A security-aware design scheme for better hardware Trojan detection sensitivity conference May 2015
Toward automatic proof generation for information flow policies in third-party hardware IP conference May 2015
R2D2: Runtime reassurance and detection of A2 Trojan conference April 2018
FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection conference May 2019
A Novel Hardware Trojan Protection Technology Based on Logic Encryption conference November 2018
A proof-carrying based framework for trusted microprocessor IP conference November 2013
Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans conference November 2017
Stealth assessment of hardware Trojans in a microcontroller conference September 2012
TAINT: Tool for Automated INsertion of Trojans conference November 2017
DFTT: Design for Trojan Test conference December 2010
A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans conference July 2014
Hardware Trojans classification for gate-level netlists based on machine learning conference July 2016
Hardware Trojans classification for gate-level netlists using multi-layer neural networks conference July 2017
HATE: a HArdware Trojan Emulation Environment for Microprocessor-based Systems conference July 2019
Applied formal methods for hardware Trojan detection conference June 2014
VeriCoq: A Verilog-to-Coq converter for proof-carrying hardware automation conference May 2015
Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier conference May 2017
Hardware Trojan Design on Neural Networks conference May 2019
TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection conference May 2023
Semi-supervised Trojan Nets Classification Using Anomaly Detection Based on SCOAP Features conference May 2022
Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO conference May 2021
A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware conference May 2021
MAAS: Hiding Trojans in Approximate Circuits conference April 2023
Detection and analysis of hardware trojan using scan chain method conference June 2015
Hardware Trust through Layout Filling: A Hardware Trojan Prevention Technique conference July 2016
Layout Vulnerability Reduction against Trojan Insertion Using Security-Aware White Space Distribution conference July 2017
An Improved Automatic Hardware Trojan Generation Platform conference July 2019
A Secure Design Methodology to Prevent Targeted Trojan Insertion during Fabrication conference June 2023
Benchmarking of SoC-Level Hardware Vulnerabilities: A Complete Walkthrough conference June 2023
SymbA: Symbolic Execution at C-level for Hardware Trojan Activation conference October 2021
Property Based Formal Security Verification for Hardware Trojan Detection conference July 2018
Hardware Trojan Detection and Functionality Determination for Soft IPs conference July 2018
Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain journal August 2014
Hardware Trojan Attacks: Threat Analysis and Countermeasures journal August 2014
Defeating hardware Trojan in microprocessor cores through software obfuscation conference March 2018
Hardware Trojan Threats to Cache Coherence in Modern 2.5D Chiplet Systems journal July 2022
FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic journal June 2015
Detecting Hardware Trojans with Gate-Level Information-Flow Tracking journal August 2016
Protection Against Hardware Trojans With Logic Testing: Proposed Solutions and Challenges Ahead journal April 2018
TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning conference September 2024
The Hunt For The Kill Switch journal May 2008
Advancing the state-of-the-art in hardware Trojans design conference August 2017
Robust bitstream protection in FPGA-based systems through low-overhead obfuscation conference November 2016
Identifying Specious LUTs for Satisfiability Don’t Care Trojan Detection conference September 2021
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically conference May 2010
Defeating UCI: Building Stealthy and Malicious Hardware conference May 2011
A2: Analog Malicious Hardware conference May 2016
ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans conference May 2020
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time conference May 2021
An Implicit Enumeration Algorithm to Generate Tests for Combinational Logic Circuits journal March 1981
Scalable Concolic Testing of RTL Models journal July 2021
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training journal February 2023
A Framework for Automated Exploration of Trojan Attack Space in FPGA Netlists journal October 2023
Node-Wise Hardware Trojan Detection Based on Graph Learning journal March 2025
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection journal October 2009
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans journal December 2014
Cost-efficient Acceleration of Hardware Trojan Detection Through Fan-Out Cone Analysis and Weighted Random Pattern Technique journal May 2016
TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits journal April 2016
TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling With Optimal Loop Unrolling Factor During High Level Synthesis journal April 2017
Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality journal September 2017
Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis journal July 2018
A Practical Split Manufacturing Framework for Trojan Prevention via Simultaneous Wire Lifting and Cell Insertion journal September 2019
PMTP: A MAX-SAT-Based Approach to Detect Hardware Trojan Using Propagation of Maximum Transition Probability journal January 2020
Hybrid Evolutionary Design Space Exploration Algorithm With Defence Against Third Party IP Vulnerabilities journal October 2020
Scalable Activation of Rare Triggers in Hardware Trojans by Repeated Maximal Clique Sampling journal July 2021
ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits journal April 2022
A Novel Algorithm for Hardware Trojan Detection Through Reverse Engineering journal April 2022
GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists journal August 2022
Hardware-Supported Patching of Security Bugs in Hardware IP Blocks journal January 2023
An Automated Framework for Board-Level Trojan Benchmarking journal February 2023
Circuit Topology-Aware Vaccination-Based Hardware Trojan Detection journal September 2023
GNN4HT: A Two-Stage GNN-Based Approach for Hardware Trojan Multifunctional Classification journal January 2025
Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme journal June 2022
Advancing the State-of-the-Art in Hardware Trojans Detection journal January 2019
HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion journal May 2019
Hardware Trojans hidden in RTL don't cares — Automated insertion and prevention methodologies conference October 2015
FASTrust: Feature analysis for third-party IP trust verification conference October 2015
Hardware trojan detection through information flow security verification conference October 2017
Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify conference October 2018
Scalable Hardware Trojan Activation by Interleaving Concrete Simulation and Symbolic Execution conference October 2018
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation journal March 2014
Reverse Engineering Digital Circuits Using Structural and Functional Analyses journal March 2014
Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking Techniques journal October 2017
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects journal October 2021
Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection journal February 2012
Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion journal June 2016
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist journal February 2017
Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection journal January 2020
Design and Validation for FPGA Trust under Hardware Trojan Attacks journal July 2016
Black-Hat High-Level Synthesis: Myth or Reality? journal April 2019
HarTBleed: Using Hardware Trojans for Data Leakage Exploits journal April 2020
Cache-Out: Leaking Cache Memory Using Hardware Trojan journal June 2020
AdaTrust: Combinational Hardware Trojan Detection Through Adaptive Test Pattern Construction journal March 2021
SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking journal August 2021
Golden Reference-Free Hardware Trojan Localization Using Graph Convolutional Network journal October 2022
Trojan Resilient Computing in COTS Processors Under Zero Trust journal October 2022
TVF: A Metric for Quantifying Vulnerability Against Hardware Trojan Attacks journal July 2023
Novel Design of Hardware Trojan: A Generic Approach for Defeating Testability Based Detection conference December 2020
Efficient Trace Signal Selection for Post Silicon Validation and Debug conference January 2011
Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage
  • Rajendran, Jeyavijayan; Dhandayuthapany, Arunshankar Muruga; Vedula, Vivekananda
  • 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID) https://doi.org/10.1109/VLSID.2016.143
conference January 2016
Hardware Trojan Detection Using ATPG and Model Checking
  • Cruz, Jonathan; Farahmandi, Farimah; Ahmed, Alif
  • 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID) https://doi.org/10.1109/VLSID.2018.43
conference January 2018
Proof carrying-based information flow tracking for data secrecy protection and hardware trust conference April 2012
Modeling and test generation for combinational hardware Trojans conference April 2018
Taming Combinational Trojan Detection Challenges with Self-Referencing Adaptive Test Patterns conference April 2020
HW2VEC: a Graph Learning Tool for Automating Hardware Security conference December 2021
Complete information flow tracking from the gates up
  • Tiwari, Mohit; Wassel, Hassan M. G.; Mazloom, Bita
  • Proceedings of the 14th international conference on Architectural support for programming languages and operating systems https://doi.org/10.1145/1508244.1508258
conference March 2009
Security against hardware Trojan through a novel application of design obfuscation conference November 2009
VeriTrust conference May 2013
FANCI: identification of stealthy malicious logic using boolean functional analysis conference January 2013
Advanced Techniques for Designing Stealthy Hardware Trojans conference June 2014
FIGHT-Metric conference June 2014
DeTrust conference November 2014
Untrusted Third Party Digital IP Cores conference May 2015
Detecting malicious modifications of data in third-party intellectual property cores conference June 2015
Pre-silicon security verification and validation conference June 2015
A Hardware Design Language for Timing-Sensitive Information-Flow Security journal March 2015
Avfsm conference June 2016
Information dispersion for trojan defense through high-level synthesis conference June 2016
Malicious LUT conference November 2016
Mers conference October 2016
OPTICS: ordering points to identify the clustering structure journal June 1999
Toggle MUX conference June 2017
Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models
  • Piccolboni, Luca; Menon, Alessandro; Pravadelli, Graziano
  • ACM Transactions on Embedded Computing Systems, Vol. 16, Issue 5s https://doi.org/10.1145/3126552
journal September 2017
Swan conference November 2018
Security conference November 2018
CAD-Base
  • Basu, Kanad; Saeed, Samah Mohamed; Pilato, Christian
  • ACM Transactions on Design Automation of Electronic Systems, Vol. 24, Issue 4 https://doi.org/10.1145/3315574
journal April 2019
How Secure Is Split Manufacturing in Preventing Hardware Trojan? journal March 2020
Soft-HaT
  • Alam, Md Mahbub; Nahiyan, Adib; Sadi, Mehdi
  • ACM Transactions on Design Automation of Electronic Systems, Vol. 25, Issue 4 https://doi.org/10.1145/3396521
journal June 2020
The Big Hack Explained: Detection and Prevention of PCB Supply Chain Implants
  • Mehta, Dhwani; Lu, Hangwei; Paradis, Olivia P.
  • ACM Journal on Emerging Technologies in Computing Systems, Vol. 16, Issue 4 https://doi.org/10.1145/3401980
journal October 2020
Hardware Trojan Attack in Embedded Memory
  • Wang, Xinmu; Hoque, Tamzidul; Basak, Abhishek
  • ACM Journal on Emerging Technologies in Computing Systems, Vol. 17, Issue 1 https://doi.org/10.1145/3422353
journal January 2021
Taal journal March 2021
Hardware Information Flow Tracking journal May 2021
Deterrent conference July 2022
Hardware Trojan Insertion Using Reinforcement Learning conference June 2022
The Improved COTD Technique for Hardware Trojan Detection in Gate-level Netlist conference June 2022
AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection journal January 2023
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning conference November 2022
A Symbolic Approach to Detecting Hardware Trojans Triggered by Don’t Care Transitions journal December 2022
Security Closure of IC Layouts Against Hardware Trojans conference March 2023
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing
  • Gaikwad, Pravin; Cruz, Jonathan; Chakraborty, Prabuddha
  • ACM Journal on Emerging Technologies in Computing Systems, Vol. 19, Issue 3 https://doi.org/10.1145/3592795
journal June 2023
Scoap conference January 1980
Register transfer level information flow tracking for provably secure hardware design conference March 2017
An automated configurable Trojan insertion framework for dynamic trust benchmarks conference March 2018
TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint conference March 2019
Test Pattern Superposition to Detect Hardware Trojans conference March 2020
Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis conference March 2020
GNN4TJ: Graph Neural Networks for Hardware Trojan Detection at Register Transfer Level conference February 2021
MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction conference March 2022
Inter-IP Malicious Modification Detection through Static Information Flow Tracking conference March 2022
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering journal August 2020

Similar Records

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
Journal Article · Mon Apr 01 00:00:00 EDT 2024 · IEEE Access · OSTI ID:2340739

Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks
Journal Article · Fri Jul 01 00:00:00 EDT 2022 · IEEE Transactions on Very Large Scale Integration (VLSI) Systems · OSTI ID:1877019

Targeted modification of hardware trojans
Journal Article · Mon Mar 18 00:00:00 EDT 2019 · Journal of Hardware and Systems Security (Online) · OSTI ID:1502452