Introduction to Hardware Security and Trust 2011
DOI: 10.1007/978-1-4419-8080-9_14
|View full text |Cite
|
Sign up to set email alerts
|

Trojan Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…HTs can leak secret information, disable the IC, or even destroy the IC [10] making them very dangerous. HTs can be described in terms of their physical and activation characteristics [1], [10]. Physical : A HT can change the functionality or parameters of the IC.…”
Section: B Hardware Trojansmentioning
confidence: 99%
See 1 more Smart Citation
“…HTs can leak secret information, disable the IC, or even destroy the IC [10] making them very dangerous. HTs can be described in terms of their physical and activation characteristics [1], [10]. Physical : A HT can change the functionality or parameters of the IC.…”
Section: B Hardware Trojansmentioning
confidence: 99%
“…This practice helps to lower costs and reduce time-to-market pressure, but can also lead to security problems such as malicious modifications to ICs, also known as hardware Trojans (HTs). HTs can change IC functionality, reduce IC reliability, leak valuable information from the IC, and even cause denial of service [1]. Depending on the applications, the consequences of HTs range from loss of profit if used in consumer-electronic devices to life-threatening if used in military devices.…”
Section: Introductionmentioning
confidence: 98%
“…HTs can change the IC's functionality, leak secret information, disable or destroy the entire chip and are thus very dangerous [6]. Numerous countermeasures have been proposed and most of them happen at test-time.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, chips, especially those with sensitive data like cryptographic devices, are subject to different kinds of attacks including both invasive and noninvasive attacks [7].Microprobing is one kind of invasive attacks that can be used to access the chip surface directly. Reverse engineering is another form of invasive attacks that is used to understand the inner structure and the functionality of a device.…”
Section: Introductionmentioning
confidence: 99%