Abstract
A hardware Trojan is a circuit that is incorporated into LSI by a malicious designer. The LSI, which was infected with a hardware Trojan, acts following its specifications in normal operations. However, when Trojan trigger is actuated, subversive activities, such as leak of important information, occur. A software Trojan can be theoretically removed. However, since a hardware Trojan is physically incorporated into LSI, it is difficult to find from outside and it cannot be removed. The present study verifies the validity and effect of the countermeasure-annulled hardware Trojan by performing detection tests.
Publisher
Trans Tech Publications, Ltd.