Publication | Closed Access
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
513
Citations
7
References
2010
Year
Hardware TrojanEngineeringInformation SecurityVerificationComputer ArchitectureInformation ForensicsPotential ThreatsSoftware AnalysisFormal VerificationHardware SecurityFirmware DetectionSystems EngineeringTrusted Execution EnvironmentHardware Security SolutionThreat (Computer)Better UnderstandingCritical SystemsComputer EngineeringTrustworthy HardwareComputer ScienceData SecurityCryptographySecurityTechnologyFault Attack
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
| Year | Citations | |
|---|---|---|
Page 1
Page 1