Moein, SamerGebali, FayezT. Aaron GulliverAbdulrahman Alkandari
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan identification and classification. This identification can be used to compare trojan risk or severity and trojan detection effectiveness. Identification vectors are generated for each hardware trojan and trojan detection technique based on the corresponding attributes. Vectors are also defined which represent trojan risk or severity and trojan detection effectiveness.
Samer MoeinFayez GebaliT. Aaron GulliverAbdulrahman Alkandari
Samer MoeinFayez GebaliT. Aaron GulliverAbdulrahman Alkandari
Mark TehranipoorN. Nalla AnandakumarFarimah Farahmandi