Overview of the detection and prevention study of hardware Trojans

The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electroni...

Full description

Bibliographic Details
Main Authors: Qiang XU,Xing-hao JIANG1,Li-hong YAO, Zhi-qiang ZHANG,Cheng ZHANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00160
_version_ 1811255042994339840
author Qiang XU,Xing-hao JIANG1,Li-hong YAO
Zhi-qiang ZHANG,Cheng ZHANG
author_facet Qiang XU,Xing-hao JIANG1,Li-hong YAO
Zhi-qiang ZHANG,Cheng ZHANG
author_sort Qiang XU,Xing-hao JIANG1,Li-hong YAO
collection DOAJ
description The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electronic devices.After introducing the concept of hardware Trojans,the characteristics and its forms were briefly analyzed.Then the detection technologies,and the prevention strategies of the hardware Trojans were discussed.At last,the development trend of the hardware Trojans was summarized.
first_indexed 2024-04-12T17:17:56Z
format Article
id doaj.art-8f6d8e1c91164f4391c5a50eaf6ee138
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-12T17:17:56Z
publishDate 2017-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-8f6d8e1c91164f4391c5a50eaf6ee1382022-12-22T03:23:34ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-04-013411310.11959/j.issn.2096-109x.2017.00160Overview of the detection and prevention study of hardware TrojansQiang XU,Xing-hao JIANG1,Li-hong YAO0Zhi-qiang ZHANG,Cheng ZHANG1School of Electronic Information and Electrical Engineering,Shanghai Jiaotong University,Shanghai 200240,ChinaShanghai Electro-Mechanical Engineering Institute,Shanghai 201109,ChinaThe design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electronic devices.After introducing the concept of hardware Trojans,the characteristics and its forms were briefly analyzed.Then the detection technologies,and the prevention strategies of the hardware Trojans were discussed.At last,the development trend of the hardware Trojans was summarized.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00160integrated circuit chipshardware trojansdetectionprevention
spellingShingle Qiang XU,Xing-hao JIANG1,Li-hong YAO
Zhi-qiang ZHANG,Cheng ZHANG
Overview of the detection and prevention study of hardware Trojans
网络与信息安全学报
integrated circuit chips
hardware trojans
detection
prevention
title Overview of the detection and prevention study of hardware Trojans
title_full Overview of the detection and prevention study of hardware Trojans
title_fullStr Overview of the detection and prevention study of hardware Trojans
title_full_unstemmed Overview of the detection and prevention study of hardware Trojans
title_short Overview of the detection and prevention study of hardware Trojans
title_sort overview of the detection and prevention study of hardware trojans
topic integrated circuit chips
hardware trojans
detection
prevention
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00160
work_keys_str_mv AT qiangxuxinghaojiang1lihongyao overviewofthedetectionandpreventionstudyofhardwaretrojans
AT zhiqiangzhangchengzhang overviewofthedetectionandpreventionstudyofhardwaretrojans