DocumentCode :
2835522
Title :
Security risks in hardware: Implementation and detection problem
Author :
Adamov, Alexander ; Hahanov, Vladimir
Author_Institution :
Kharkov Nat. Univ. of Radio Electron., Kharkov, Ukraine
fYear :
2010
fDate :
17-20 Sept. 2010
Firstpage :
425
Lastpage :
427
Abstract :
This paper describes a problem of trust in hardware that can be compromised by means of malicious inclusions called Hardware Trojans. The Hardware Trojans can be embedded in safety critical, security and military systems, such as weapon control systems, battlefield communication systems, information collection and decision making systems, satellite electronics, banking systems, cryptosystems, etc. The goal of the paper is to represent potential abilities of Trojan implementation in integrated circuits (IC) as well as the formal description of Trojan model and probable ways of security verification at a high level of data abstraction.
Keywords :
data structures; formal verification; invasive software; Trojan implementation; battlefield communication system; data abstraction; formal description; hardware Trojans; integrated circuits; military system; security system; security verification; Analytical models; Hardware; Integrated circuit modeling; Time domain analysis; Time varying systems; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design & Test Symposium (EWDTS), 2010 East-West
Conference_Location :
St. Petersburg
Print_ISBN :
978-1-4244-9555-9
Type :
conf
DOI :
10.1109/EWDTS.2010.5742118
Filename :
5742118
Link To Document :
بازگشت