За технічних причин Електронний архів Харківського національного університету радіоелектроніки «ElAr КhNURE» працює тільки на перегляд. Про відновлення роботи у повному обсязі буде своєчасно повідомлено.
 

Публікація:
Malicious Hardware: characteristics, classification and formal models

dc.contributor.authorГорбачев, В. А.uk_UA
dc.date.accessioned2016-11-09T22:23:55Z
dc.date.available2016-11-09T22:23:55Z
dc.date.issued2014
dc.description.abstractElectronic Systems (ES) that contain embedded malicious hardware represent a serious threat, especially for government, aeronautic, financial and energy system applications. MHs can be implemented as hardware modifications to application specific ICs (ASICs), microprocessors, digital signal processors, or as IP core modifications for field programmable gate arrays (FPGA) [1]. They are able to turn off the CPU, to send confidential information and bypass the software user authentication mechanisms. There are some important characteristics of this type of threat: standard testing methods, such as the common functional verification and Automatic Test Pattern Generation (ATPG) cannot always be used to solve the problem of detecting MH [2], [3]; identification of the threat sources without special tools is practically impossible; even in cases when an information security violation is detected, it is very difficult to prove that this action was performed by MH. These and other features make MHs very promising embedded devices for planning of electronic terrorism. Therefore, detecting and preventing approaches are in the attention centre of IT systems security investigation.uk_UA
dc.identifier.citationGorbachov V. Malicious Hardware: characteristics, classification and formal models / V. Gorbachov // IEEE East-West Design & Test Symposium (EWDTS2014), Kiev, Ukraine, KhNURE, 2014, pp. 254-257.uk_UA
dc.identifier.isbn978-1-4799-7630-0
dc.identifier.urihttp://openarchive.nure.ua/handle/document/3435
dc.language.isoen_USuk_UA
dc.publisherIEEEuk_UA
dc.subjectIntegrated circuit modelinguk_UA
dc.subjectHardwareuk_UA
dc.subjectSwitchesuk_UA
dc.subjectAvailabilityuk_UA
dc.subjectHard disksuk_UA
dc.subjectInformation securityuk_UA
dc.titleMalicious Hardware: characteristics, classification and formal modelsuk_UA
dc.typeThesisuk_UA
dspace.entity.typePublication

Файли

Оригінальний пакет
Зараз показано 1 - 1 з 1
Завантаження...
Зображення мініатюри
Назва:
Vg-IEEE.pdf
Розмір:
297.81 KB
Формат:
Adobe Portable Document Format
Ліцензійний пакет
Зараз показано 1 - 1 з 1
Немає доступних мініатюр
Назва:
license.txt
Розмір:
9.42 KB
Формат:
Item-specific license agreed upon to submission
Опис: