Title :
The problem of Trojan inclusions in software and hardware
Author :
Adamov, Alexander ; Saprykin, Alexander
Author_Institution :
Kharkov Nat. Univ. of Radio Electron., Kharkov, Ukraine
Abstract :
This paper describes an information security threat implemented in software and hardware by means of malicious inclusions called Trojans. Creation of Trojans is mostly driven by criminal with the purpose of financial profit and sabotage. The Trojans programs can steal money from your bank account, payment system, credit card numbers, and other personal information; use your computer as a part of "zombie" network to perform fraudulent actions of hacker. The hardware Trojans can be embedded in safety critical, security and military systems, such as weapon control systems, battlefield communication systems, information collection and decision making systems, satellite electronics, banking systems, cryptosystems, etc. The goal of the paper is to compare the security problem of high level computer systems with the same problem in hardware systems, such as System-on Chip. Therefore, the class of Trojan malicious programs is considered in both environments: software and hardware.
Keywords :
computer crime; fraud; invasive software; Trojan inclusions; bank account; credit card numbers; financial profit; fraudulent actions; hardware Trojans; high level computer systems; information security threat; malicious inclusions; military systems; payment system; personal information; sabotage; safety critical systems; zombie network; Computer hacking; Computers; Hardware; Software; Trojan horses;
Conference_Titel :
Design & Test Symposium (EWDTS), 2010 East-West
Conference_Location :
St. Petersburg
Print_ISBN :
978-1-4244-9555-9
DOI :
10.1109/EWDTS.2010.5742081