Untitled Document
You are from : ( )  
Untitled Document
Untitled Document

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

This paper describes a model of security inclusions in hardware called Hardware Trojans that can be embedded during design and manufacture stages. The Hardware Trojans can be embedded in safety critical, security and military systems, such as weapon control systems, battlefield communication systems, information collection and decision making systems, satellite electronics, banking systems, cryptosystems, etc.

The goal of the paper is to represent potential abilities of Trojan implementation in integrated circuits (IC) as well as the formal description of Trojan model and probable ways of security verification at a high level of data abstraction

Keywords :

: NA

References :

  1. «PC giant warns of hardware trojan», NewScientist, 22 July 2010.
  2. X. Wang, M. Tehranipoor and J. Plusquellic, "Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions", International Workshop on Hardware Oriented Security and Trust, 2008, pp. 15-22.
  3. F. Wolff, C. Papachristou, S. Bhunia, R. S. Chakraborty, "Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme", DATE'08, 2008.
  4. Transaction Level Modeling using OSCI TLM 2.0, http://www.systemc.org/downloads/standards , June 2010.

Untitled Document
Untitled Document
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.