Terminology – Industry Term for IC ‘Drop-In’ Circuits Used for Malicious Purposes

terminology

There is a vocabulary for code used for malicious or clandestine purposes. Terms include malware, virus, trojan-horse…

In a large IC with millions of transistors, it is feasible to produce a version with an additional small drop-in that can be exploited without any special software included in the host machine. These tiny additions are particularly difficult to detect without destructive deconstruction and mapping via electron or X-ray microscopy.

Is there are term for this class of hardware exploit?

I'm looking for something beyond "Fake IC" or "counterfeit IC", those presumably deceive the customer for reasons of profit, but wouldn't necessarily contain extra circuit layout for malicious or clandestine purposes.

Best Answer

Trojan is the term. Specifically Hardware Trojan. This term is generic as it applies to any hardware that produces this unwanted security hole, including MITM hardware, equipment with circuit boards replaced, firmware replacement, add on hardware like mod-chips not disclosed to the end user etc. Not specifically just wafer level changes to an IC, but that's included.

See https://www.sbir.gov/sbirsearch/detail/1319177 for the Design Tools for Hardware Trojan Detection and Mitigation article provided to the Department of Defense.