HARDWARE TROJAN IDENTIFICATION AND DETECTION

HARDWARE TROJAN IDENTIFICATION AND DETECTION 

Samer Moein1 , Fayez Gebali1 , T. Aaron Gulliver1 , And Abdulrahman Alkandari2 

1Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada

2Department of Computer Science, Public Authority for Applied Education and Training, Kuwait City, Kuwait 

ABSTRACT 

The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan identification and classification. This identification can be used to compare trojan risk or severity and trojan detection effectiveness. Identification vectors are generated for each hardware trojan and trojan detection technique based on the corresponding attributes. Vectors are also defined which represent trojan risk or severity and trojan detection effectiveness. 

KEYWORDS 

Hardware trojan detection, hardware trojan identification, trojan severity, trojan risk, trojan detection effectiveness  

SOURCE URL

https://wireilla.com/papers/ijcis/V7N2/7217ijcis01.pdf

MORE DETAILS

https://wireilla.com/ijcis/index.html




Comments

Popular posts from this blog

A DEFENSE MECHANISM FOR CREDIT CARD FRAUD DETECTION

DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT