Trojan taxonomy

Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

With the steady increase in outsourcing of semiconductor integrated circuits (ICs) manufacturing, the concerns for malicious inclusions are increasing within the military and the commercial sectors. Recently, Trojans in ICs used by military equipment have been reported [1]. Trojans can change the functionality of an IC and affect mission critical equipment. Trojans can also disable a system at will. These concerns caused the Defense Advanced Research Projects Agency (DARPA) to initiate the Trust in ICs program. This program focuses on developing Trojan detection methods [2, 3].

Original languageEnglish (US)
Title of host publicationIntroduction to Hardware Security and Trust
PublisherSpringer New York
Pages325-338
Number of pages14
Volume9781441980809
ISBN (Electronic)9781441980809
ISBN (Print)1441980792, 9781441980793
DOIs
StatePublished - Oct 1 2012

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Trojan taxonomy'. Together they form a unique fingerprint.

  • Cite this

    Karri, R., Rajendran, J., & Rosenfeld, K. (2012). Trojan taxonomy. In Introduction to Hardware Security and Trust (Vol. 9781441980809, pp. 325-338). Springer New York. https://doi.org/10.1007/978-1-4419-8080-9_14