• DocumentCode
    2891192
  • Title

    Detection of Trojan HW by using hidden information on the system

  • Author

    Keren, O. ; Levin, I. ; Sinelnikov, V.

  • Author_Institution
    Sch. of Eng., Bar Ilan Univ., Ramat Gan, Israel
  • fYear
    2011
  • fDate
    13-15 July 2011
  • Firstpage
    192
  • Lastpage
    193
  • Abstract
    A Trojan horse is a malicious altering of hardware specification or implementation in such a way that its functionality is altered under a set of conditions defined by the attacker. The paper presents a technique for designing secure systems that can detect an active Trojan. The technique is based on utilizing specific information about the system´s behavior, which is known to the designer of the system and/or is hidden in the functional specification of the system. A case study of the proposed technique conducted on an arithmetic unit of a microprocessor is provided. The study indicated a high level of Trojan detection with a small hardware overhead.
  • Keywords
    digital arithmetic; integrated circuit design; microprocessor chips; security of data; Trojan HW detection; Trojan horse; arithmetic unit; functional specification; hidden information; malicious hardware specification alteration; microprocessor chip; secure system design; Copper; Hardware; Input variables; Law; Testing; Trojan horses;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    On-Line Testing Symposium (IOLTS), 2011 IEEE 17th International
  • Conference_Location
    Athens
  • Print_ISBN
    978-1-4577-1053-7
  • Type

    conf

  • DOI
    10.1109/IOLTS.2011.5993839
  • Filename
    5993839