1. 首页
  2. 安全技术
  3. 系统安全
  4. A Case Study in Hardware Trojan Design and Implementation

A Case Study in Hardware Trojan Design and Implementation

上传者: 2018-12-26 02:09:38上传 PDF文件 751.72KB 热度 47次
As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication facilities is becoming prohibitive, pushing industry to make greater use of potentially less reliable foreign sources for their IC supply. The 2008 Computer Security AwarenessWeek (CSAW) Embedded Systems Challenge at the Polytechnic Institute of NYU highlighted s ome of the vulnerabilities of the IC supply chain in the form of a hardware hacking challenge. This paper explores the design and implementation of our winning entry. ome of the vulnerabilities of the IC supply chain in the form of a hardware hacking challenge. This paper explores the design and implementation of our winning entry.
用户评论
码姐姐匿名网友 2018-12-26 02:09:38

东西看不懂呀 太高深了