ZHENG Chao-xia, HAN Ling, LI Yang, ZOU Xue-cheng. The Implementation and Analysis of a Trojan Circuit in IC Chips[J]. Microelectronics & Computer, 2012, 29(10): 78-80.
Citation: ZHENG Chao-xia, HAN Ling, LI Yang, ZOU Xue-cheng. The Implementation and Analysis of a Trojan Circuit in IC Chips[J]. Microelectronics & Computer, 2012, 29(10): 78-80.

The Implementation and Analysis of a Trojan Circuit in IC Chips

  • Hidden Trojan circuits provide an attacker with a stealthy attack vector.Trojan circuits can bypass traditional defensive techniques as they occupy a layer below the entire software stack.We present the design and implementation of a counter Trojan circuits into a IC chip by standard CMOS technology HJ0.25um,then we analyze such flexible hardware allows powerful,general purpose attacks,while remaining surprisingly low in the amount of additional hardware.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return