Computer and Modernization ›› 2012, Vol. 1 ›› Issue (11): 155-157+.doi: 10.3969/j.issn.1006-2475.2012.11.038

• 信息安全 • Previous Articles     Next Articles

Analysis and Detection of Hardware Trojan

MI Qi, HU Qi, XU Chao, YIN Rui   

  1. Shanghai Space Propulsion Technology Research Institute, SAST, CASC, Shanghai 201109, China
  • Received:2012-07-17 Revised:1900-01-01 Online:2012-11-10 Published:2012-11-10

Abstract: Nowadays the possibility of implanting hardware trojan in chip during the design and manufacturing process is growing higher and higher. In order to avoid large-scales hardware trojan attack, this paper elaborates detailedly the hazard, conception, classification and technical background of hardware trojan, introduces four currently popular hardware trojan detection methods, also gives recommendations for these feasibility methods.

Key words: chip, hardware trojan, analysis, detection

CLC Number: