DocumentCode :
2060715
Title :
Detecting Malicious Logic Through Structural Checking
Author :
Smith, Scott C. ; Di, Jia
Author_Institution :
Univ. of Missouri -Rolla, Rolla
fYear :
2007
fDate :
20-22 April 2007
Firstpage :
217
Lastpage :
222
Abstract :
Hardware is just as susceptible as software to "hacker attacks", through inclusion of malicious logic; and the consequences of such an attack could be disastrous! The impact of software viruses has been felt, at one time or another, by the entire computerized world, through loss of productivity, loss of system resources or data, or mere inconvenience. However, the nature of malicious logic and defending against it is fundamentally different from its software counterpart. Malicious logic has the added dimension of not being removable once encapsulated in the system. This paper will identify hardware vulnerabilities and will outline an automated method, called structural checking, to detect and prevent malicious logic from becoming incorporated into an ASIC, which could cause catastrophic system failure, security breaches, or other dire consequences.
Keywords :
application specific integrated circuits; computer viruses; system recovery; ASIC; catastrophic system failure; hacker attack; hardware vulnerability; malicious logic; security breach; structural checking; Application specific integrated circuits; Automatic testing; Circuit testing; Data engineering; Design automation; Hardware; Logic design; Logic testing; Phase detection; System testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Region 5 Technical Conference, 2007 IEEE
Conference_Location :
Fayetteville, AR
Print_ISBN :
978-1-4244-1280-8
Electronic_ISBN :
978-1-4244-1280-8
Type :
conf
DOI :
10.1109/TPSD.2007.4380384
Filename :
4380384
Link To Document :
بازگشت