Hardware Trojans. Part 4: software and hardware countermeasures
نویسندگان
چکیده
منابع مشابه
Hardware Trojans – Prevention, Detection, Countermeasures (A Literature Review)
A Hardware Trojan is a malicious, undesired, intentional modification of an electronic circuit or design, resulting in the incorrect behaviour of an electronic device when in operation – a back-door that can be inserted into hardware. A Hardware Trojan may be able to defeat any and all security mechanisms (software or hardware-based) and subvert or augment the normal operation of an infected de...
متن کاملStealthy Dopant-Level Hardware Trojans
With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...
متن کاملStealthy Dopant-Level Hardware Trojans
In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or criticalinfrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans i...
متن کاملHardware Trojans - A Systemic Threat
Hardware trojans are a systemic threat that can impact the operations and infrastructure of corporations and government organisations. In this paper, we evaluate a credible and organisation-wide hardware trojan threat from compromised network cards. Our research examines the systemic threat of hardware trojans with an actual hardware trojan implementation to evaluate the impact. Our hardware tr...
متن کاملPoster: Hardware Trojans – Detect and React?
Hardware Trojans are a serious threat. In comparison to their software counterparts, appropriate detection measures are still missing. The main reason is that there are no malware implementations to develop and test against. To solve this, we implemented a Hardware Trojan Kit (HTK) that enables the modular construction of Hardware Trojans based on the attributes activation, covert communication...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nanoindustry Russia
سال: 2017
ISSN: 1993-8578
DOI: 10.22184/1993-8578.2017.72.2.42.56