SBA Online Women's Business Center
Malicious hardware is a fairly new research topic that has attracted the interest of the scientific community. Therefore, numerous approaches have been proposed in the last years to counter the threat of so-called hardware Trojans. This paper describes malicious hardware in the context of the security of hardware infrastructure components. Network infrastructure plays a vital role in their everyday lives, since many services depend on reliable and secure connections. In the following, the authors briefly introduce the topic of hardware Trojans. After describing their basic components, they give some insights into how hardware Trojans can be used maliciously in infrastructure devices.