Hardware Trojans - A Systemic Threat

نویسندگان

  • John Shield
  • Bradley D. Hopkins
  • Mark R. Beaumont
  • Chris J. North
چکیده

Hardware trojans are a systemic threat that can impact the operations and infrastructure of corporations and government organisations. In this paper, we evaluate a credible and organisation-wide hardware trojan threat from compromised network cards. Our research examines the systemic threat of hardware trojans with an actual hardware trojan implementation to evaluate the impact. Our hardware trojan can degrade network services inside a corporate network, controllable from outside the network. An external activation mechanism is used to activate the trojan; the implementation bypasses data encryption, firewall packet inspection, and is agnostic to software protection and the operating system. .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Malware in Hardware Infrastructure Components

Malicious hardware is a fairly new research topic that has attracted the interest of the scientific community. Therefore, numerous approaches have been proposed in the last years to counter the threat of so-called hardware Trojans. This chapter describes malicious hardware in the context of the security of hardware infrastructure components. Network infrastructure plays a vital role in our ever...

متن کامل

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

A Practical Test Patterns Generation Technique for Hardware Trojan Detection

Due to the globalization of the integrated circuit manufacturing industry, hardware Trojans constitutes an increasingly probable threat to both military and commercial applications. The Trojans being stealthy in nature, the Trojan hardware is hard to be triggered under random patterns. In this paper, we propose practical test patterns generation technique based on rare logic conditions at inter...

متن کامل

Hardware Trojans – Prevention, Detection, Countermeasures (A Literature Review)

A Hardware Trojan is a malicious, undesired, intentional modification of an electronic circuit or design, resulting in the incorrect behaviour of an electronic device when in operation – a back-door that can be inserted into hardware. A Hardware Trojan may be able to defeat any and all security mechanisms (software or hardware-based) and subvert or augment the normal operation of an infected de...

متن کامل

Detection of Malicious Insertions in Hardware through an Integrative Validation Approach

Integrated Circuit (IC) manufacturing has become an increasingly global process, which leads to the growing threat of hardware Trojan attacks. In the absence of a trusted supply chain model, post-manufacturing detection of hardware Trojans has gained relevance in commercial and military applications, where trusted field operation is critical. In a distributed manufacturing chain, there are seve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015