Publication | Closed Access
A Survey of Hardware Trojan Taxonomy and Detection
1.4K
Citations
34
References
2010
Year
Hardware TrojanEngineeringInformation SecurityComputer ArchitectureInformation ForensicsHardware Trojan TaxonomyIntegrated CircuitsSide-channel AttackSoftware AnalysisHardware SecurityFirmware DetectionHardware Security SolutionComputer EngineeringHardware TrojansComputer ScienceData SecurityProgram AnalysisTrojan DetectionMalicious AlterationsFault AttackPhysical Unclonable Function
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection.
| Year | Citations | |
|---|---|---|
Page 1
Page 1