Overview of the detection and prevention study of hardware Trojans
The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electroni...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00160 |
_version_ | 1811255042994339840 |
---|---|
author | Qiang XU,Xing-hao JIANG1,Li-hong YAO Zhi-qiang ZHANG,Cheng ZHANG |
author_facet | Qiang XU,Xing-hao JIANG1,Li-hong YAO Zhi-qiang ZHANG,Cheng ZHANG |
author_sort | Qiang XU,Xing-hao JIANG1,Li-hong YAO |
collection | DOAJ |
description | The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electronic devices.After introducing the concept of hardware Trojans,the characteristics and its forms were briefly analyzed.Then the detection technologies,and the prevention strategies of the hardware Trojans were discussed.At last,the development trend of the hardware Trojans was summarized. |
first_indexed | 2024-04-12T17:17:56Z |
format | Article |
id | doaj.art-8f6d8e1c91164f4391c5a50eaf6ee138 |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-04-12T17:17:56Z |
publishDate | 2017-04-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-8f6d8e1c91164f4391c5a50eaf6ee1382022-12-22T03:23:34ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-04-013411310.11959/j.issn.2096-109x.2017.00160Overview of the detection and prevention study of hardware TrojansQiang XU,Xing-hao JIANG1,Li-hong YAO0Zhi-qiang ZHANG,Cheng ZHANG1School of Electronic Information and Electrical Engineering,Shanghai Jiaotong University,Shanghai 200240,ChinaShanghai Electro-Mechanical Engineering Institute,Shanghai 201109,ChinaThe design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electronic devices.After introducing the concept of hardware Trojans,the characteristics and its forms were briefly analyzed.Then the detection technologies,and the prevention strategies of the hardware Trojans were discussed.At last,the development trend of the hardware Trojans was summarized.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00160integrated circuit chipshardware trojansdetectionprevention |
spellingShingle | Qiang XU,Xing-hao JIANG1,Li-hong YAO Zhi-qiang ZHANG,Cheng ZHANG Overview of the detection and prevention study of hardware Trojans 网络与信息安全学报 integrated circuit chips hardware trojans detection prevention |
title | Overview of the detection and prevention study of hardware Trojans |
title_full | Overview of the detection and prevention study of hardware Trojans |
title_fullStr | Overview of the detection and prevention study of hardware Trojans |
title_full_unstemmed | Overview of the detection and prevention study of hardware Trojans |
title_short | Overview of the detection and prevention study of hardware Trojans |
title_sort | overview of the detection and prevention study of hardware trojans |
topic | integrated circuit chips hardware trojans detection prevention |
url | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00160 |
work_keys_str_mv | AT qiangxuxinghaojiang1lihongyao overviewofthedetectionandpreventionstudyofhardwaretrojans AT zhiqiangzhangchengzhang overviewofthedetectionandpreventionstudyofhardwaretrojans |