Trojan taxonomy

Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

With the steady increase in outsourcing of semiconductor integrated circuits (ICs) manufacturing, the concerns for malicious inclusions are increasing within the military and the commercial sectors. Recently, Trojans in ICs used by military equipment have been reported [1]. Trojans can change the functionality of an IC and affect mission critical equipment. Trojans can also disable a system at will. These concerns caused the Defense Advanced Research Projects Agency (DARPA) to initiate the Trust in ICs program. This program focuses on developing Trojan detection methods [2, 3].

Original languageEnglish (US)
Title of host publicationIntroduction to Hardware Security and Trust
PublisherSpringer New York
Pages325-338
Number of pages14
Volume9781441980809
ISBN (Print)9781441980809, 1441980792, 9781441980793
DOIs
StatePublished - Oct 1 2012

Fingerprint

Taxonomies
Integrated circuits
Military equipment
Outsourcing
Semiconductor materials

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Karri, R., Rajendran, J., & Rosenfeld, K. (2012). Trojan taxonomy. In Introduction to Hardware Security and Trust (Vol. 9781441980809, pp. 325-338). Springer New York. https://doi.org/10.1007/978-1-4419-8080-9_14

Trojan taxonomy. / Karri, Ramesh; Rajendran, Jeyavijayan; Rosenfeld, Kurt.

Introduction to Hardware Security and Trust. Vol. 9781441980809 Springer New York, 2012. p. 325-338.

Research output: Chapter in Book/Report/Conference proceedingChapter

Karri, R, Rajendran, J & Rosenfeld, K 2012, Trojan taxonomy. in Introduction to Hardware Security and Trust. vol. 9781441980809, Springer New York, pp. 325-338. https://doi.org/10.1007/978-1-4419-8080-9_14
Karri R, Rajendran J, Rosenfeld K. Trojan taxonomy. In Introduction to Hardware Security and Trust. Vol. 9781441980809. Springer New York. 2012. p. 325-338 https://doi.org/10.1007/978-1-4419-8080-9_14
Karri, Ramesh ; Rajendran, Jeyavijayan ; Rosenfeld, Kurt. / Trojan taxonomy. Introduction to Hardware Security and Trust. Vol. 9781441980809 Springer New York, 2012. pp. 325-338
@inbook{397ed31082cc4264aa4bcbb145207bfe,
title = "Trojan taxonomy",
abstract = "With the steady increase in outsourcing of semiconductor integrated circuits (ICs) manufacturing, the concerns for malicious inclusions are increasing within the military and the commercial sectors. Recently, Trojans in ICs used by military equipment have been reported [1]. Trojans can change the functionality of an IC and affect mission critical equipment. Trojans can also disable a system at will. These concerns caused the Defense Advanced Research Projects Agency (DARPA) to initiate the Trust in ICs program. This program focuses on developing Trojan detection methods [2, 3].",
author = "Ramesh Karri and Jeyavijayan Rajendran and Kurt Rosenfeld",
year = "2012",
month = "10",
day = "1",
doi = "10.1007/978-1-4419-8080-9_14",
language = "English (US)",
isbn = "9781441980809",
volume = "9781441980809",
pages = "325--338",
booktitle = "Introduction to Hardware Security and Trust",
publisher = "Springer New York",

}

TY - CHAP

T1 - Trojan taxonomy

AU - Karri, Ramesh

AU - Rajendran, Jeyavijayan

AU - Rosenfeld, Kurt

PY - 2012/10/1

Y1 - 2012/10/1

N2 - With the steady increase in outsourcing of semiconductor integrated circuits (ICs) manufacturing, the concerns for malicious inclusions are increasing within the military and the commercial sectors. Recently, Trojans in ICs used by military equipment have been reported [1]. Trojans can change the functionality of an IC and affect mission critical equipment. Trojans can also disable a system at will. These concerns caused the Defense Advanced Research Projects Agency (DARPA) to initiate the Trust in ICs program. This program focuses on developing Trojan detection methods [2, 3].

AB - With the steady increase in outsourcing of semiconductor integrated circuits (ICs) manufacturing, the concerns for malicious inclusions are increasing within the military and the commercial sectors. Recently, Trojans in ICs used by military equipment have been reported [1]. Trojans can change the functionality of an IC and affect mission critical equipment. Trojans can also disable a system at will. These concerns caused the Defense Advanced Research Projects Agency (DARPA) to initiate the Trust in ICs program. This program focuses on developing Trojan detection methods [2, 3].

UR - http://www.scopus.com/inward/record.url?scp=84949175794&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84949175794&partnerID=8YFLogxK

U2 - 10.1007/978-1-4419-8080-9_14

DO - 10.1007/978-1-4419-8080-9_14

M3 - Chapter

SN - 9781441980809

SN - 1441980792

SN - 9781441980793

VL - 9781441980809

SP - 325

EP - 338

BT - Introduction to Hardware Security and Trust

PB - Springer New York

ER -