首页> 外文期刊>International Journal of Scientific & Technology Research >Hardware Trojan Model For Attack And Detection Techniques
【24h】

Hardware Trojan Model For Attack And Detection Techniques

机译:攻击和检测技术的硬件木马模型

获取原文
           

摘要

Abstract: Today's integrated circuits (ICs) are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. The interventions of human in production of Hardware resources have given room for possible modification of hardware components, so as to achieve some malicious aims. This modification help with possible loop holes in the hardware component for later attack. Due to the increase in popularity aim of attacks using embedded Trojan horse programs into chips, attacker are more likely to suppress them with malicious program, also notwithstanding the increase in disintegration of the design and manufacturing process of our microelectronic products (ICs), we should not only concern about inclusion of unplanned, undesirable hardware features ("bugs"), rather about inclusion of planned malicious hardware features: "Trojan Horses," which act as spies or guerrillas. This paper presents a Model of the fundamental attacks and possible detection techniques of Hardware Trojan. The result of the research has shown a great significance in education and for further researches.
机译:摘要:当今的集成电路(IC)容易受到硬件木马的攻击,这些木马是在设计或制造过程中对电路的恶意更改。人类对硬件资源生产的干预为硬件组件的可能修改提供了空间,以实现某些恶意目的。此修改有助于解决硬件组件中可能存在的漏洞,以便以后进行攻击。由于使用嵌入式特洛伊木马程序植入芯片进行攻击的目的日益广泛,因此,尽管我们的微电子产品(IC)的设计和制造过程越来越瓦解,但攻击者更有可能用恶意程序对其进行压制。不仅关注包含计划外的不良硬件功能(“错误”),还关注包含计划内的恶意硬件功能:“特洛伊木马”,它们充当间谍或游击队。本文提出了硬件木马的基本攻击模型和可能的检测技术。研究结果在教育和进一步研究中显示了重要的意义。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号