Abstract
The paper addresses the threat to the security of using electronic systems, which may include malicious inclusions. The action classification of malicious hardware (MH) is given. The MH formal models, as well as formal model of unauthorized access, executed by MH, are based on the subject-object concept.

This publication has 2 references indexed in Scilit: