摘要
New hardware security threats are emerging, meanwhile detection and recognition technologies are immature for unknown types. This paper introduces a relation matrix to analysis perniciousness of IC hardware Trojan. The relation matrix is based on characteristic deployment includes concealment of trigger and harmfulness of payload. Results of this paper can be used to measure the perniciousness of different types of hardware Trojan, also provide a way to predict new hardware threats, in this way help to defend unknown hardware attacks and improve detection efficiency.
| 源语言 | 英语 |
|---|---|
| 文章编号 | 012089 |
| 期刊 | Journal of Physics: Conference Series |
| 卷 | 1074 |
| 期 | 1 |
| DOI | |
| 出版状态 | 已出版 - 30 8月 2018 |
| 活动 | International Conference on Mechanical, Electric and Industrial Engineering, MEIE 2018 - Hangzhou, 中国 期限: 12 5月 2018 → 14 5月 2018 |
指纹
探究 'Perniciousness analysis of IC hardware Trojan based on characteristic function deployment' 的科研主题。它们共同构成独一无二的指纹。引用此
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver