Sciweavers

Share
HOST
2008
IEEE

Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions

11 years 7 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost foundries has made ICs vulnerable to malicious alterations, that could, under specific conditions, result in functional changes and/or catastrophic failure of the system in which they are embedded. We refer to such malicious alternations and inclusions as Hardware Trojans. The modification(s) introduced by the Trojan depends on the application, with some designed to disable the system or degrade signal integrity, while others are designed to defeat hardware security and encryption to leak plain text information. This paper explores the wide range of malicious alternations of ICs that are possible and proposes a general framework for their classification. The taxonomy is essential for properly evaluating the effectiveness of methods designed to detect Trojans. The latter portion of the paper explores several T...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell
Added 29 May 2010
Updated 29 May 2010
Type Conference
Year 2008
Where HOST
Authors Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquellic
Comments (0)
books