Showing posts with label Hardware Trojans. Show all posts
Showing posts with label Hardware Trojans. Show all posts

Tuesday, February 11, 2014

[dwaterson] Hardware Trojans

Hardware Trojans are created through the malicious and intentional alteration of hardware which produce effects unintended by initial design. They reside at the lowest level of information processing – on the integrated circuit (IC) board. Hardware Trojans are able to leak sensitive information, they can cause incorrect functioning of a component, or they can cause a component to fail in a Denial of Service (DoS) attack. Hardware Trojans are an increasing threat to every processing environment, particularly to commercial and military applications, as well as to critical infrastructure.