Abstract

New hardware security threats are emerging, meanwhile detection and recognition technologies are immature for unknown types. This paper introduces a relation matrix to analysis perniciousness of IC hardware Trojan. The relation matrix is based on characteristic deployment includes concealment of trigger and harmfulness of payload. Results of this paper can be used to measure the perniciousness of different types of hardware Trojan, also provide a way to predict new hardware threats, in this way help to defend unknown hardware attacks and improve detection efficiency.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call