Abstract

Code-Controlled Hardware Trojan horse is an important kind of hardware Trojan horse and may be existent in various electronic equipments. It is necessary and imperative to detect this kind of Trojan horse. In this paper we firstly study characteristics of Code-Controlled Hardware Trojan horse. Then model checking, a kind of formalization method, is primarily researched to detect Code-Controlled Hardware Trojan horse. To detect Code-Controlled hardware Trojan horses effectively, we investigate published detection techniques for hardware Trojan horses and point out their deficiencies. Finally we present a new special detection approach combined with model checking and reverse-engineering. Experiments indicate that the new detection approach is effective to detect Code-Controlled Hardware Trojan horse.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call