Recently, we concern about the risk of the hardware Trojan embedded in some IC chips as a malicious circuit.
The hardware Trojan causes operations that the user does not expect. Toshiba Information Systems (Japan) Corporation has developed a tool to detect hardware Trojan embedded in the circuit design process, HTfinder, jointly with Waseda University.
The scope of the hardware Trojan detection service is design data of semiconductor circuit. Any completed LSIs or products themselves that use LSIs including information equipment, automobiles, home appliances can not be applied.
This service is for domestic customers only.
The hardware Trojan
The Trojan is malware (program that attacks the computer system when receiving a trigger). The hardware Trojan is the hardware version of the Trojan.
The hardware Trojan is embedded by a malicious third party in the LSI design process. Once it starts an attack by the set up trigger, the attack is not stoppable. The hardware Trojan is difficult to find through general simulation or other means because it can be neatly embedded in an encrypted chip or wireless module. Therefore, you need a special detection process to check that hardware Trojan are not mixed in before manufactureing.
Threat of the hardware Trojan
High density, high speed, multifunctional are required for LSIs to support smart devices that are smaller and more powerful. As a result, only a few manufacturers now internally perform design through manufacturing semiconductor. They usually outsource some design processes or use third-party's intellectual property.
In this increasingly complicated design process, unauthorized circuits are more likely to be embedded than before. In this smart society era, hardware can also cause a various types of damage, including leakage of important information, or the spread of viruses in many areas.