Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Hardware TrojanMay 2012
Publisher:
  • PON PRESS
ISBN:978-613-6-27430-0
Published:15 May 2012
Pages:
72
Skip Bibliometrics Section
Reflects downloads up to 11 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. A hardware Trojan is a malicious modification of the circuitry of an integrated circuit. A hardware Trojan is completely characterized by its physical representation and its behavior. The payload of an HTH is the entire activity that the Trojan executes when it is triggered. In general, malicious Trojans try to bypass or disable the security fence of a system: It can leak confidential information by radio emission. HTHs also could disable, derange or destroy the entire chip or components of it.

Contributors

Recommendations