DocumentCode :
2834884
Title :
The problem of Trojan inclusions in software and hardware
Author :
Adamov, Alexander ; Saprykin, Alexander
Author_Institution :
Kharkov Nat. Univ. of Radio Electron., Kharkov, Ukraine
fYear :
2010
fDate :
17-20 Sept. 2010
Firstpage :
449
Lastpage :
451
Abstract :
This paper describes an information security threat implemented in software and hardware by means of malicious inclusions called Trojans. Creation of Trojans is mostly driven by criminal with the purpose of financial profit and sabotage. The Trojans programs can steal money from your bank account, payment system, credit card numbers, and other personal information; use your computer as a part of "zombie" network to perform fraudulent actions of hacker. The hardware Trojans can be embedded in safety critical, security and military systems, such as weapon control systems, battlefield communication systems, information collection and decision making systems, satellite electronics, banking systems, cryptosystems, etc. The goal of the paper is to compare the security problem of high level computer systems with the same problem in hardware systems, such as System-on Chip. Therefore, the class of Trojan malicious programs is considered in both environments: software and hardware.
Keywords :
computer crime; fraud; invasive software; Trojan inclusions; bank account; credit card numbers; financial profit; fraudulent actions; hardware Trojans; high level computer systems; information security threat; malicious inclusions; military systems; payment system; personal information; sabotage; safety critical systems; zombie network; Computer hacking; Computers; Hardware; Software; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design & Test Symposium (EWDTS), 2010 East-West
Conference_Location :
St. Petersburg
Print_ISBN :
978-1-4244-9555-9
Type :
conf
DOI :
10.1109/EWDTS.2010.5742081
Filename :
5742081
Link To Document :
بازگشت