• DocumentCode
    2835522
  • Title

    Security risks in hardware: Implementation and detection problem

  • Author

    Adamov, Alexander ; Hahanov, Vladimir

  • Author_Institution
    Kharkov Nat. Univ. of Radio Electron., Kharkov, Ukraine
  • fYear
    2010
  • fDate
    17-20 Sept. 2010
  • Firstpage
    425
  • Lastpage
    427
  • Abstract
    This paper describes a problem of trust in hardware that can be compromised by means of malicious inclusions called Hardware Trojans. The Hardware Trojans can be embedded in safety critical, security and military systems, such as weapon control systems, battlefield communication systems, information collection and decision making systems, satellite electronics, banking systems, cryptosystems, etc. The goal of the paper is to represent potential abilities of Trojan implementation in integrated circuits (IC) as well as the formal description of Trojan model and probable ways of security verification at a high level of data abstraction.
  • Keywords
    data structures; formal verification; invasive software; Trojan implementation; battlefield communication system; data abstraction; formal description; hardware Trojans; integrated circuits; military system; security system; security verification; Analytical models; Hardware; Integrated circuit modeling; Time domain analysis; Time varying systems; Trojan horses;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Design & Test Symposium (EWDTS), 2010 East-West
  • Conference_Location
    St. Petersburg
  • Print_ISBN
    978-1-4244-9555-9
  • Type

    conf

  • DOI
    10.1109/EWDTS.2010.5742118
  • Filename
    5742118