Hardware Trojan Resistant Computation Using Heterogeneous COTS Processors

Download Now
Provided by: Commonwealth of Australia
Topic: Security
Format: PDF
Hardware Trojans pose a credible and increasing threat to computer security, with the potential to compromise the very electronics that ostensibly provide the security primitives underpinning various computer architectures. The discovery of stealthy hardware Trojans within integrated circuits by current state-of-the-art pre and post-manufacturing test and verification techniques cannot be guaranteed. Therefore electronic systems, especially those controlling safety or security critical systems should be designed to operate with integrity in the presence of any hardware Trojans, and regardless of any Trojan activity.
Download Now

Find By Topic