Classification overview of the Hardware Trojans in digital circuits

  • Grigore Mihai Timis Technical University “Gh.Asachi” Iasi
  • Alexandru Valachi Technical University “Gh.Asachi” Iasi
Keywords: Hardware Trojan detection, Hardware Trojan prevention, Hardware Trojan attacks, Hardware Trojan classification, Hardware Trojan Taxonomy

Abstract

This paper presents an overview of the Hardware Trojans classification methods. A malicious entity can introduce a Hardware Trojan (HT) into a design in order to denial of service, destroy or disable the system. Moreover, it could leak the confidential information and the secret keys before altered them. The Hardware Trojan (HT) threats should be analyzed with maximum importance through the entire lifecycle of the integrated circuit (ICs). A hardware protection against the detected harmful logic should also be implemented.

Downloads

Download data is not yet available.
Published
2020-12-29
How to Cite
1.
Timis G, Valachi A. Classification overview of the Hardware Trojans in digital circuits. The Annals of “Dunarea de Jos“ University of Galati. Fascicle III, Electrotechnics, Electronics, Automatic Control, Informatics [Internet]. 29Dec.2020 [cited 6Feb.2025];43(3):12-5. Available from: https://gup.ugal.ro/ugaljournals/index.php/eeaci/article/view/4128
Section
Articles