Abstract
With the steady increase in outsourcing of semiconductor integrated circuits (ICs) manufacturing, the concerns for malicious inclusions are increasing within the military and the commercial sectors. Recently, Trojans in ICs used by military equipment have been reported [1]. Trojans can change the functionality of an IC and affect mission critical equipment. Trojans can also disable a system at will. These concerns caused the Defense Advanced Research Projects Agency (DARPA) to initiate the Trust in ICs program. This program focuses on developing Trojan detection methods [2, 3].
Original language | English (US) |
---|---|
Title of host publication | Introduction to Hardware Security and Trust |
Publisher | Springer New York |
Pages | 325-338 |
Number of pages | 14 |
Volume | 9781441980809 |
ISBN (Electronic) | 9781441980809 |
ISBN (Print) | 1441980792, 9781441980793 |
DOIs | |
State | Published - Oct 1 2012 |
ASJC Scopus subject areas
- General Engineering