2010
DOI: 10.1007/s10207-010-0115-0
|View full text |Cite
|
Sign up to set email alerts
|

A case study in hardware Trojan design and implementation

Abstract: As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication facilities is becoming prohibitive, pushing industry to make greater use of potentially less reliable foreign sources for their IC supply. The 2008 Computer Security Awareness Week (CSAW) Embedded Systems Challenge at the Polytechnic Institute … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
37
0
5

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(42 citation statements)
references
References 23 publications
0
37
0
5
Order By: Relevance
“…In particular, it is noted that the operating system determines the software component of the memory access mechanism and it can detect a signal delay associated with the introduction of a modification. Also paper [1] shows common approaches to ensure the protection against these malicious processors.…”
Section: #8 / 70 / 2016mentioning
confidence: 99%
See 3 more Smart Citations
“…In particular, it is noted that the operating system determines the software component of the memory access mechanism and it can detect a signal delay associated with the introduction of a modification. Also paper [1] shows common approaches to ensure the protection against these malicious processors.…”
Section: #8 / 70 / 2016mentioning
confidence: 99%
“…Paper [1] gives two of the most common approaches to creating malicious processors. The authors show how the electric circuits of hardware Trojans can be embedded in the processor to carry out such attacks as the theft of passwords, access privileges extension and automatic logins to the system.…”
Section: #8 / 70 / 2016mentioning
confidence: 99%
See 2 more Smart Citations
“…[8] developed two HTs compromising memory access mechanism and shadow mode mechanism to support software attacks without showing detailed implementation. [9], [10] presented several HT designs with various trigger methods and malicious behaviors in the embedded system challenge competition. [11] designed two simple HTs controlled by a counter for the RSA encryption circuit.…”
Section: A Related Workmentioning
confidence: 99%