2015 Tenth International Conference on Computer Engineering &Amp; Systems (ICCES) 2015
DOI: 10.1109/icces.2015.7393074
|View full text |Cite
|
Sign up to set email alerts
|

An attribute based classification of hardware trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Based on the previous classification, Refs. [ 7 , 95 , 96 ] gave a comprehensive taxonomy, including the logic type, functionality, and so on. There is a relatively complete taxonomy of HTs.…”
Section: Hardware Trojans and Their Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the previous classification, Refs. [ 7 , 95 , 96 ] gave a comprehensive taxonomy, including the logic type, functionality, and so on. There is a relatively complete taxonomy of HTs.…”
Section: Hardware Trojans and Their Classificationmentioning
confidence: 99%
“…The HTs can be classified according to their effects, such as information leakage, DoS, etc. [ 95 ]. Information leakage is destructive to military actions and commercial activities, which even can destroy a country or an enterprise.…”
Section: Hardware Trojans and Their Classificationmentioning
confidence: 99%
“…A comprehensive model for trojan classification was presented in [20] which is based on eight categories: insertion, abstraction, effect, logic type, functionality, activation, physical layout, and location. A classification of attributes based on this model is illustrated in Figure 2.…”
Section: Hardware Trojans and Their Detectionmentioning
confidence: 99%
“…A comprehensive investigation of hardware trojan attributes was presented in [20]. These attributes provide a complete characterization of trojans.…”
Section: Hardware Trojan Attributesmentioning
confidence: 99%
“…Further, some overt attacks introduce hardware trojans [2] by modifying Integrated Circuits (ICs) to create abnormal system behaviour, while others monitor system emissions to obtain information. The increasing sophistication of hardware attacks as well as the growing chip complexity makes hardware security a major challenge for the semiconductor industry [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%