Malicious hardware: Characteristics, classification and formal models
- 1 September 2014
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)
Abstract
The paper addresses the threat to the security of using electronic systems, which may include malicious inclusions. The action classification of malicious hardware (MH) is given. The MH formal models, as well as formal model of unauthorized access, executed by MH, are based on the subject-object concept.Keywords
This publication has 2 references indexed in Scilit:
- Detecting malicious inclusions in secure hardware: Challenges and solutionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Towards Trojan-Free Trusted ICs: Problem Analysis and Detection SchemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008