Design of Hardware Trojan Applying on Cryptogrammic-Board for PC

Article Preview

Abstract:

The vulnerabilities in todays design and fabrication process have raised the possibility of malicious circuit modification as known as Trojans in a design to impact the functionality or transmit key information to the adversary. In this article the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

794-796

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mohammad Tehranipoor, Farinaz Koushanfar. A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design and Test of Computers.

DOI: 10.1109/mdt.2010.7

Google Scholar

[2] Harrini Bhamidipati. Single Trojan Injection Model Generation And Detection. Case Western Reserve University.

Google Scholar

[3] Miodrag Potkonjak, Ramesh Karri. Special Issue on Integrated Circuit and System Security. IEEE Transactions on Information Forensics and Security

Google Scholar

[4] Thomas Feller, Aziz Demirezen. HARDWARE TROJANS: Data Leakage Using General Purpose LEDs. Technical Report - TUD-CS-2010-2384.

Google Scholar