Trustworthy hardware: Identifying and classifying hardware trojans

Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, Mohammad Tehranipoor

Research output: Contribution to journalArticle

Abstract

For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.

Original languageEnglish (US)
Article number5604161
Pages (from-to)39-46
Number of pages8
JournalComputer
Volume43
Issue number10
DOIs
StatePublished - Oct 2010

Fingerprint

Taxonomies
Industrial plants
Electronic equipment
Hardware
Hardware security

Keywords

  • Design and test
  • Hardware security and trust
  • Hardware Trojans
  • Security and privacy

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Karri, R., Rajendran, J., Rosenfeld, K., & Tehranipoor, M. (2010). Trustworthy hardware: Identifying and classifying hardware trojans. Computer, 43(10), 39-46. [5604161]. https://doi.org/10.1109/MC.2010.299

Trustworthy hardware : Identifying and classifying hardware trojans. / Karri, Ramesh; Rajendran, Jeyavijayan; Rosenfeld, Kurt; Tehranipoor, Mohammad.

In: Computer, Vol. 43, No. 10, 5604161, 10.2010, p. 39-46.

Research output: Contribution to journalArticle

Karri, R, Rajendran, J, Rosenfeld, K & Tehranipoor, M 2010, 'Trustworthy hardware: Identifying and classifying hardware trojans', Computer, vol. 43, no. 10, 5604161, pp. 39-46. https://doi.org/10.1109/MC.2010.299
Karri R, Rajendran J, Rosenfeld K, Tehranipoor M. Trustworthy hardware: Identifying and classifying hardware trojans. Computer. 2010 Oct;43(10):39-46. 5604161. https://doi.org/10.1109/MC.2010.299
Karri, Ramesh ; Rajendran, Jeyavijayan ; Rosenfeld, Kurt ; Tehranipoor, Mohammad. / Trustworthy hardware : Identifying and classifying hardware trojans. In: Computer. 2010 ; Vol. 43, No. 10. pp. 39-46.
@article{02e8dddb14424f3db7ca6a05d960048c,
title = "Trustworthy hardware: Identifying and classifying hardware trojans",
abstract = "For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.",
keywords = "Design and test, Hardware security and trust, Hardware Trojans, Security and privacy",
author = "Ramesh Karri and Jeyavijayan Rajendran and Kurt Rosenfeld and Mohammad Tehranipoor",
year = "2010",
month = "10",
doi = "10.1109/MC.2010.299",
language = "English (US)",
volume = "43",
pages = "39--46",
journal = "ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering",
issn = "0018-9162",
publisher = "IEEE Computer Society",
number = "10",

}

TY - JOUR

T1 - Trustworthy hardware

T2 - Identifying and classifying hardware trojans

AU - Karri, Ramesh

AU - Rajendran, Jeyavijayan

AU - Rosenfeld, Kurt

AU - Tehranipoor, Mohammad

PY - 2010/10

Y1 - 2010/10

N2 - For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.

AB - For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.

KW - Design and test

KW - Hardware security and trust

KW - Hardware Trojans

KW - Security and privacy

UR - http://www.scopus.com/inward/record.url?scp=77958115258&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77958115258&partnerID=8YFLogxK

U2 - 10.1109/MC.2010.299

DO - 10.1109/MC.2010.299

M3 - Article

AN - SCOPUS:77958115258

VL - 43

SP - 39

EP - 46

JO - ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering

JF - ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering

SN - 0018-9162

IS - 10

M1 - 5604161

ER -