[Zurück]


Vorträge und Posterpräsentationen (mit Tagungsband-Eintrag):

A. Dabrowski, H. Hobel, J. Ullrich, K. Krombholz, E. Weippl:
"Towards a Hardware Trojan Detection Cycle";
Vortrag: International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland; 08.09.2014 - 12.09.2014; in: "International Workshop on Emerging Cyberthreats and Countermeasures", (2014).



Kurzfassung deutsch:
Intentionally inserted malfunctions in integrated
circuits, referred to as Hardware Trojans, have become an
emerging threat. Recently, the scientific community started to
propose technical approaches to mitigate the threat of unspecified
and potentially malicious functionality. However, these detection
and prevention mechanisms are still hardly integrated in
the industry´s Hardware development life cycles. We therefore
propose in this work a secure hardware development life cycle
that assembles methods from trustworthy software engineering.In
addition to full traceability from specification to implementation,
and down to each gate, we introduce a feedback detection cycle
that systematically escorts every single step of the development
process. To do so, we integrate different detection methods
for each development phase that are derived from a common
knowledge base.

Kurzfassung englisch:
Intentionally inserted malfunctions in integrated
circuits, referred to as Hardware Trojans, have become an
emerging threat. Recently, the scientific community started to
propose technical approaches to mitigate the threat of unspecified
and potentially malicious functionality. However, these detection
and prevention mechanisms are still hardly integrated in
the industry´s Hardware development life cycles. We therefore
propose in this work a secure hardware development life cycle
that assembles methods from trustworthy software engineering.In
addition to full traceability from specification to implementation,
and down to each gate, we introduce a feedback detection cycle
that systematically escorts every single step of the development
process. To do so, we integrate different detection methods
for each development phase that are derived from a common
knowledge base.

Erstellt aus der Publikationsdatenbank der Technischen Universität Wien.