Affiliation:
1. Technical University “Gh.Asachi”Iasi, Faculty of Automatic Control and Computer Engineering ROMANIA
Abstract
This paper presents an analysis of a sequential Triggered “Time Bomb” hardware Trojan (HT). Major security concerns have been rising up since malicious modification of hardware or fabrication IC can lead to an altered functional behavior, potentially with disastrous consequences in safety-critical applications. Due to the stealthy nature of the hardware Trojans the conventional design and time verification and post manufacturing testing cannot be readily extended. There are a large number of possible instances and operating modes for the hardware Trojans in a digital system. Since the hardware Trojan insertion can modify the functionality of the digital integrated circuit (IC), alter its behavior, generate denial of service (DoS), the HT threats should be analyzed with maximum importance through the entire lifecycle of the IC.
Publisher
World Scientific and Engineering Academy and Society (WSEAS)