跳到主要导航 跳到搜索 跳到主要内容

Perniciousness analysis of IC hardware Trojan based on characteristic function deployment

科研成果: 期刊稿件会议文章同行评审

摘要

New hardware security threats are emerging, meanwhile detection and recognition technologies are immature for unknown types. This paper introduces a relation matrix to analysis perniciousness of IC hardware Trojan. The relation matrix is based on characteristic deployment includes concealment of trigger and harmfulness of payload. Results of this paper can be used to measure the perniciousness of different types of hardware Trojan, also provide a way to predict new hardware threats, in this way help to defend unknown hardware attacks and improve detection efficiency.

源语言英语
文章编号012089
期刊Journal of Physics: Conference Series
1074
1
DOI
出版状态已出版 - 30 8月 2018
活动International Conference on Mechanical, Electric and Industrial Engineering, MEIE 2018 - Hangzhou, 中国
期限: 12 5月 201814 5月 2018

指纹

探究 'Perniciousness analysis of IC hardware Trojan based on characteristic function deployment' 的科研主题。它们共同构成独一无二的指纹。

引用此