Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published June 30, 2017 | Version v1
Journal article Open

HARDWARE TROJAN IDENTIFICATION AND DETECTION

  • 1. University of Victoria, Victoria, BC, Canada
  • 2. Public Authority for Applied Education and Training, Kuwait City, Kuwait

Description

ABSTRACT

The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan identification and classification. This identification can be used to compare trojan risk or severity and trojan detection effectiveness. Identification vectors are generated for each hardware trojan and trojan detection technique based on the corresponding attributes. Vectors are also defined which represent trojan risk or severity and trojan detection effectiveness.

Files

7217ijcis01.pdf

Files (942.5 kB)

Name Size Download all
md5:8a561f0a24e7216d47463067f48cf68e
942.5 kB Preview Download