publication . Other literature type . Article . 2017

Hardware Trojan Identification And Detection

Samer Moein; Fayez Gebali; T. Aaron Gulliver; Abdulrahman Alkandari;
Open Access
  • Published: 30 Jun 2017
  • Publisher: Zenodo
Abstract
ABSTRACT<br> The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan identification and classification. This identification can be used to compare trojan risk or severity and trojan detection effectivene...
Subjects
ACM Computing Classification System: Software_OPERATINGSYSTEMSComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSComputingMilieux_COMPUTERSANDSOCIETY
free text keywords: Hardware trojan detection, hardware trojan identification, trojan severity, trojan risk, trojan detection effectiveness, 100503 Computer Communications Networks, Embedded system, business.industry, business, Hardware Trojan, Computer science
Download fromView all 5 versions
Zenodo
Other literature type . 2017
Provider: Datacite
ZENODO
Article . 2017
Provider: ZENODO
Zenodo
Other literature type . 2017
Provider: Datacite
Any information missing or wrong?Report an Issue