Design, Implementation and Detection of Hardware Trojans in Sequential systems

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

For decades, digital systems have been designed based on assumptions that the underlying hardware, though not perfectly reliable, is free of malicious elements. The demand for IC’s is greatly increasing due to tremendous technological development. Without appropriate resources the companies are hard pressed to produce trusted IC’s. This is driving the companies into the ‘fabless’ trend predominant in semi-conductor industry, where the companies are depending on cheaper foundries for the IC fabrication instead of depending on their own resources. This growth brings with it a big rise in threat level in terms of Hardware Trojans that hits the manufacturing companies which make use of Integrated Circuits. This transcends many industries, including strategic organizations and telecommunication companies, mobile phones and computers, embedded systems used in domestic applications and health care equipment. These adversarial inclusions are generally triggered to do malicious modifications in the end user system by the intruder, which is difficult to detect in their quiescent state. This paper focuses on understanding Hardware Trojans, their implications and detection methodologies. It is extremely important for all industries and more so for defense organizations, who are involved in developing systems to protect the nation’s boundaries.

Cite

CITATION STYLE

APA

Hema*, Dr. L. K., Murty, Dr. S. A. V. S., & Sugumaran, Dr. V. (2019). Design, Implementation and Detection of Hardware Trojans in Sequential systems. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 3665–3670. https://doi.org/10.35940/ijrte.d7893.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free