HARDWARE TROJAN IDENTIFICATION AND DETECTION
- 1. University of Victoria, Victoria, BC, Canada
- 2. Public Authority for Applied Education and Training, Kuwait City, Kuwait
Description
ABSTRACT
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan identification and classification. This identification can be used to compare trojan risk or severity and trojan detection effectiveness. Identification vectors are generated for each hardware trojan and trojan detection technique based on the corresponding attributes. Vectors are also defined which represent trojan risk or severity and trojan detection effectiveness.
Files
7217ijcis01.pdf
Files
(942.5 kB)
Name | Size | Download all |
---|---|---|
md5:8a561f0a24e7216d47463067f48cf68e
|
942.5 kB | Preview Download |