HARDWARE TROJAN IDENTIFICATION AND DETECTION
HARDWARE TROJAN IDENTIFICATION AND
DETECTION
Samer Moein1
, Fayez Gebali1
, T. Aaron Gulliver1
, And Abdulrahman Alkandari2
1Department of Electrical and Computer Engineering, University of Victoria,
Victoria, BC, Canada
2Department of Computer Science, Public Authority for Applied Education and Training,
Kuwait City, Kuwait
ABSTRACT
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further,
the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware
trojans have a number of attributes which can be used to systematically develop detection techniques.
Based on this concept, a detailed examination of current trojan detection techniques and the characteristics
of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan
identification and classification. This identification can be used to compare trojan risk or severity and
trojan detection effectiveness. Identification vectors are generated for each hardware trojan and trojan
detection technique based on the corresponding attributes. Vectors are also defined which represent trojan
risk or severity and trojan detection effectiveness.
KEYWORDS
Hardware trojan detection, hardware trojan identification, trojan severity, trojan risk, trojan detection
effectiveness
SOURCE URL
https://wireilla.com/papers/ijcis/V7N2/7217ijcis01.pdf
MORE DETAILS
https://wireilla.com/ijcis/index.html
Comments
Post a Comment