East-West Design & Test Symposium
Download PDF

Abstract

This paper describes a problem of trust in hardware that can be compromised by means of malicious inclusions called Hardware Trojans. The Hardware Trojans can be embedded in safety critical, security and military systems, such as weapon control systems, battlefield communication systems, information collection and decision making systems, satellite electronics, banking systems, cryptosystems, etc. The goal of the paper is to represent potential abilities of Trojan implementation in integrated circuits (IC) as well as the formal description of Trojan model and probable ways of security verification at a high level of data abstraction.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles