DocumentCode :
2890945
Title :
Rise of the hardware Trojans
Author :
Sunar, Berk
Author_Institution :
Dept. of Electr. & Comput. Eng., Worcester Polytech. Inst., Worcester, MA, USA
fYear :
2011
fDate :
13-15 July 2011
Firstpage :
138
Lastpage :
138
Abstract :
Driven by strong economic incentives the globalization of the semiconductor design and fabrication industries has given rise to numerous vulnerabilities in the manufacturing chain. From design to production countless hands contribute until fabrication is completed. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time or the Trojan may leak confidential information and secret keys covertly to the adversary. These vulnerabilities have raised serious concerns regarding possible threats to financial infrastructures, transportation security systems, and military systems. Clearly there is a strong motivation to classify and study adversarial hardware design modifications, i.e. hardware Trojan horses. Here we very briefly summarize types of hardware Trojans and refer the reader to relevant works.
Keywords :
integrated circuit design; integrated circuit manufacture; integrated circuit reliability; security of data; confidential information; financial infrastructure threat; hardware Trojan horse; manufacturing chain vulnerability; military system; secret keys; semiconductor design; semiconductor fabrication industries; transportation security system; Conferences; Hardware; Industries; Integrated circuits; Materials; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
On-Line Testing Symposium (IOLTS), 2011 IEEE 17th International
Conference_Location :
Athens
Print_ISBN :
978-1-4577-1053-7
Type :
conf
DOI :
10.1109/IOLTS.2011.5993826
Filename :
5993826
Link To Document :
بازگشت