Abstract | ||
---|---|---|
Hardware Trojan (HT), caused by outsiders, modifies fabrication of a golden IC and avoids normal testing. The alteration by an HT targets disabling the main function of the IC or degrades signal integrity. Most vulnerable HTs are even designed to break hardware security. This work explores possible combinational trojan circuits, vulnerable to hardware design. It focuses on trigger and payload functions of HTs. The identified malicious hardwares are the tightly distributed large size functional type trojan, where activation is done via data, instruction or interrupt, that fall in internally activated trojan category. The detection probability of such HTs is low in comparison to the combinational HTs proposed in the literature. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/ISED.2018.8704008 | 2018 8th International Symposium on Embedded Computing and System Design (ISED) |
Keywords | Field | DocType |
Trojan horses,Payloads,Logic gates,Hardware,Integrated circuits,Testing,Logic circuits | Interrupt,Hardware Trojan,Logic gate,Hardware security module,Computer science,Signal integrity,Trojan,Computer hardware,Integrated circuit,Payload | Conference |
ISBN | Citations | PageRank |
978-1-5386-6575-6 | 0 | 0.34 |
References | Authors | |
0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Nilanjana Das | 1 | 0 | 0.68 |
Mousumi Saha | 2 | 2 | 4.13 |
Biplab K. Sikdar | 3 | 217 | 40.85 |