Overview of the detection and prevention study of hardware Trojans

The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electroni...

Full description

Saved in:
Bibliographic Details
Main Authors: Qiang XU, Xing-hao JIANG, Li-hong YAO, Zhi-qiang ZHANG, Cheng ZHANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00160
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The design and manufacture of integrated circuit chips are now a key component of the electronic industry.The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process,which brings great challenge to the security of electronic devices.After introducing the concept of hardware Trojans,the characteristics and its forms were briefly analyzed.Then the detection technologies,and the prevention strategies of the hardware Trojans were discussed.At last,the development trend of the hardware Trojans was summarized.
ISSN:2096-109X