Detection of trojan HW by using hidden information on the system

O. Keren, I. Levin, V. Sinelnikov

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A Trojan horse is a malicious altering of hardware specification or implementation in such a way that its functionality is altered under a set of conditions defined by the attacker. The paper presents a technique for designing secure systems that can detect an active Trojan. The technique is based on utilizing specific information about the system's behavior, which is known to the designer of the system and/or is hidden in the functional specification of the system. A case study of the proposed technique conducted on an arithmetic unit of a microprocessor is provided. The study indicated a high level of Trojan detection with a small hardware overhead.

Original languageEnglish
Title of host publicationProceedings of the 2011 IEEE 17th International On-Line Testing Symposium, IOLTS 2011
Pages192-193
Number of pages2
DOIs
StatePublished - 2011
Event2011 IEEE 17th International On-Line Testing Symposium, IOLTS 2011 - Athens, Greece
Duration: 13 Jul 201115 Jul 2011

Publication series

NameProceedings of the 2011 IEEE 17th International On-Line Testing Symposium, IOLTS 2011

Conference

Conference2011 IEEE 17th International On-Line Testing Symposium, IOLTS 2011
Country/TerritoryGreece
CityAthens
Period13/07/1115/07/11

Fingerprint

Dive into the research topics of 'Detection of trojan HW by using hidden information on the system'. Together they form a unique fingerprint.

Cite this