Web: http://arxiv.org/abs/2107.10147

Feb. 3, 2023, 2:10 a.m. | Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik

cs.CR updates on arXiv.org arxiv.org

The threat of hardware Trojans (HTs) and their detection is a widely studied
field. While the effort for inserting a Trojan into an application-specific
integrated circuit (ASIC) can be considered relatively high, especially when
trusting the chip manufacturer, programmable hardware is vulnerable to Trojan
insertion even after the product has been shipped or during usage. At the same
time, detecting dormant HTs with small or zero-overhead triggers and payloads
on these platforms is still a challenging task, as the Trojan …

hardware logic malicious state trojan version

More from arxiv.org / cs.CR updates on arXiv.org

Snr Security Engineer (cloud)

@ Verisk | Málaga, Spain

Cybersecurity Analyst

@ Visa | Bengaluru, India

Information Security Engineer

@ ServiceNow | Orlando, FL, United States

Director of Cloud Security - 100% US REMOTE

@ Experian | Allen, TX, United States

Azure DevSecOps - Solution Architect

@ Citizant | Chantilly, VA, United States

Cybersecurity Champion

@ NielsenIQ | Chicago, IL, United States

Senior Information Security Analyst

@ QAD, Inc. | Wroclaw, Poland

VP, Information Security

@ TrueAccord | Remote

DevSecOps Engineer- (100%) ( w/m/d) - Valbonne - Hybrid Work

@ SMG Swiss Marketplace Group | Valbonne, France

Information Security Director - Attack Surface Management (100% US REMOTE)

@ Experian | Allen, TX, United States

Director - Cybersecurity and Compliance

@ Visa | Foster City, CA, United States

Senior Threat Analyst | Remote, USA

@ Optiv | Kansas City, MO