Hardware Trojans in Electronic Devices

  • Belous A
  • Saladukha V
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software andhardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker — a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction. Describes the evolution of hardware Trojans from "cabinets", "boxes" and "cases" to advanced circuits; Discusses both software and hardware Trojans, the principles of their design, the mechanisms of functioning, the methods of detection, the methods of masking them, the methods of prevention and protection; Presents complex topics using simple language, minimizing mathematics.

Cite

CITATION STYLE

APA

Belous, A., & Saladukha, V. (2020). Hardware Trojans in Electronic Devices. In Viruses, Hardware and Software Trojans (pp. 209–275). Springer International Publishing. https://doi.org/10.1007/978-3-030-47218-4_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free