Публікація: Malicious Hardware: characteristics, classification and formal models
dc.contributor.author | Горбачев, В. А. | uk_UA |
dc.date.accessioned | 2016-11-09T22:23:55Z | |
dc.date.available | 2016-11-09T22:23:55Z | |
dc.date.issued | 2014 | |
dc.description.abstract | Electronic Systems (ES) that contain embedded malicious hardware represent a serious threat, especially for government, aeronautic, financial and energy system applications. MHs can be implemented as hardware modifications to application specific ICs (ASICs), microprocessors, digital signal processors, or as IP core modifications for field programmable gate arrays (FPGA) [1]. They are able to turn off the CPU, to send confidential information and bypass the software user authentication mechanisms. There are some important characteristics of this type of threat: standard testing methods, such as the common functional verification and Automatic Test Pattern Generation (ATPG) cannot always be used to solve the problem of detecting MH [2], [3]; identification of the threat sources without special tools is practically impossible; even in cases when an information security violation is detected, it is very difficult to prove that this action was performed by MH. These and other features make MHs very promising embedded devices for planning of electronic terrorism. Therefore, detecting and preventing approaches are in the attention centre of IT systems security investigation. | uk_UA |
dc.identifier.citation | Gorbachov V. Malicious Hardware: characteristics, classification and formal models / V. Gorbachov // IEEE East-West Design & Test Symposium (EWDTS2014), Kiev, Ukraine, KhNURE, 2014, pp. 254-257. | uk_UA |
dc.identifier.isbn | 978-1-4799-7630-0 | |
dc.identifier.uri | http://openarchive.nure.ua/handle/document/3435 | |
dc.language.iso | en_US | uk_UA |
dc.publisher | IEEE | uk_UA |
dc.subject | Integrated circuit modeling | uk_UA |
dc.subject | Hardware | uk_UA |
dc.subject | Switches | uk_UA |
dc.subject | Availability | uk_UA |
dc.subject | Hard disks | uk_UA |
dc.subject | Information security | uk_UA |
dc.title | Malicious Hardware: characteristics, classification and formal models | uk_UA |
dc.type | Thesis | uk_UA |
dspace.entity.type | Publication |
Файли
Оригінальний пакет
1 - 1 з 1
Ліцензійний пакет
1 - 1 з 1
Немає доступних мініатюр
- Назва:
- license.txt
- Розмір:
- 9.42 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: