Classification overview of the Hardware Trojans in digital circuits

  • Grigore Mihai Timis Technical University “Gh.Asachi” Iasi
  • Alexandru Valachi Technical University “Gh.Asachi” Iasi
Keywords: Hardware Trojan detection, Hardware Trojan prevention, Hardware Trojan attacks, Hardware Trojan classification, Hardware Trojan Taxonomy

Abstract

This paper presents an overview of the Hardware Trojans classification methods. A malicious entity can introduce a Hardware Trojan (HT) into a design in order to denial of service, destroy or disable the system. Moreover, it could leak the confidential information and the secret keys before altered them. The Hardware Trojan (HT) threats should be analyzed with maximum importance through the entire lifecycle of the integrated circuit (ICs). A hardware protection against the detected harmful logic should also be implemented.

Published
2020-12-29
How to Cite
1.
Timis G, Valachi A. Classification overview of the Hardware Trojans in digital circuits. The Annals of “Dunarea de Jos“ University of Galati. Fascicle III, Electrotechnics, Electronics, Automatic Control, Informatics [Internet]. 29Dec.2020 [cited 20Apr.2024];43(3):12-5. Available from: https://www.gup.ugal.ro/ugaljournals/index.php/eeaci/article/view/4128
Section
Articles

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.