Abstract

Similar to the effects of software viruses, hardware can also be compromised by introduction of malicious logic into circuits to cause unwanted system behaviors. This can be done by changing or adding internal logic, in such a way that it is undetectable using traditional testing and verification tools and techniques. Therefore, the user of the circuit needs to decide whether it can be trusted, i.e., it only performs functions defined in the original circuit specification (no more and no less), before employing it in the system. in this paper, a preliminary methodology is proposed to model potential hardware threats in order to determine a circuit's trustability and provide guidance to malicious logic checking tools. © 2007 IEEE.

Department(s)

Electrical and Computer Engineering

International Standard Book Number (ISBN)

978-142441280-8

Document Type

Article - Conference proceedings

Document Version

Citation

File Type

text

Language(s)

English

Rights

© 2024 Institute of Electrical and Electronics Engineers, All rights reserved.

Publication Date

01 Dec 2007

Share

 
COinS