HARDWARE SECURITY AND TRUST


IEEE Design & Test of Computers , January/February 2010, pp. 10–25

Wooden trojan horse

Subscribe to IEEE Design & Test of Computers

IEEE Design & Test of Computers magazine offers works describing the methods used to design and test electronic product hardware and supportive software.

Current issue:
Flexible Electronics

A Survey of Hardware Trojan Taxonomy and Detection

by Mohammad Tehranipoor and Farinaz Koushanfar

Because of globalization of the semiconductor design and fabrication process, ICs are becoming increasingly vulnerable to malicious activities and alterations. These vulnerabilities have raised serious concerns regarding possible threats to military systems, financial infrastructures, transportation security, and household appliances. An adversary can introduce a Trojan designed to disable or destroy a system at some future time, or the Trojan could leak confidential information and secret keys covertly to the adversary. Read More »

Bookmark and Share

Also this month