Hardware Trojan, the Glossary
A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit.[1]
Table of Contents
45 relations: Antenna (radio), Application-specific integrated circuit, Built-in self-test, Chain of custody, Charge-induced voltage alteration, Checksum, Combinational logic, Cryptography, Dakshi Agrawal, Design for testing, Economy, Electronic circuit, Energy, Finance, Hardware backdoor, Hardware obfuscation, Hardware security, High availability, Integrated circuit, Intel Management Engine, Kill switch, KVM switch, Light-induced voltage alteration, Logic gate, Military, Missile, Outsourcing, Payload (computing), Pentium FDIV bug, Peripheral, Physical unclonable function, Radio, Radio wave, Sabotage, Scan chain, Scanning electron microscope, Security switch, Semiconductor intellectual property core, Sensor, Sequential logic, Side-channel attack, Technology, Transistor, Trojan horse (computing), USB.
- Computer hardware
Antenna (radio)
In radio engineering, an antenna (American English) or aerial (British English) is the interface between radio waves propagating through space and electric currents moving in metal conductors, used with a transmitter or receiver.
See Hardware Trojan and Antenna (radio)
Application-specific integrated circuit
An application-specific integrated circuit (ASIC) is an integrated circuit (IC) chip customized for a particular use, rather than intended for general-purpose use, such as a chip designed to run in a digital voice recorder or a high-efficiency video codec.
See Hardware Trojan and Application-specific integrated circuit
Built-in self-test
A built-in self-test (BIST) or built-in test (BIT) is a mechanism that permits a machine to test itself.
See Hardware Trojan and Built-in self-test
Chain of custody
Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence.
See Hardware Trojan and Chain of custody
Charge-induced voltage alteration
Charge-induced voltage alteration (CIVA) is a technique which uses a scanning electron microscope to locate open conductors on CMOS integrated circuits.
See Hardware Trojan and Charge-induced voltage alteration
Checksum
A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage.
See Hardware Trojan and Checksum
Combinational logic
In automata theory, combinational logic (also referred to as time-independent logic) is a type of digital logic that is implemented by Boolean circuits, where the output is a pure function of the present input only.
See Hardware Trojan and Combinational logic
Cryptography
Cryptography, or cryptology (from κρυπτός|translit.
See Hardware Trojan and Cryptography
Dakshi Agrawal
Dakshi Agrawal, from the IBM Thomas J. Watson Research Center, Yorktown Heights, New York.
See Hardware Trojan and Dakshi Agrawal
Design for testing
Design for testing or design for testability (DFT) consists of IC design techniques that add testability features to a hardware product design.
See Hardware Trojan and Design for testing
Economy
An economy is an area of the production, distribution and trade, as well as consumption of goods and services.
See Hardware Trojan and Economy
Electronic circuit
An electronic circuit is composed of individual electronic components, such as resistors, transistors, capacitors, inductors and diodes, connected by conductive wires or traces through which electric current can flow.
See Hardware Trojan and Electronic circuit
Energy
Energy is the quantitative property that is transferred to a body or to a physical system, recognizable in the performance of work and in the form of heat and light.
See Hardware Trojan and Energy
Finance
Finance refers to monetary resources and to the study and discipline of money, currency and capital assets.
See Hardware Trojan and Finance
Hardware backdoor
Hardware backdoors are backdoors in hardware, such as code inside hardware or firmware of computer chips. Hardware Trojan and hardware backdoor are computer hardware.
See Hardware Trojan and Hardware backdoor
Hardware obfuscation
Hardware obfuscation is a technique by which the description or the structure of electronic hardware is modified to intentionally conceal its functionality, which makes it significantly more difficult to reverse-engineer.
See Hardware Trojan and Hardware obfuscation
Hardware security
Hardware security is a discipline originated from the cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things. Hardware Trojan and hardware security are computer hardware.
See Hardware Trojan and Hardware security
High availability
High availability (HA) is a characteristic of a system that aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period.
See Hardware Trojan and High availability
Integrated circuit
An integrated circuit (IC), also known as a microchip, computer chip, or simply chip, is a small electronic device made up of multiple interconnected electronic components such as transistors, resistors, and capacitors.
See Hardware Trojan and Integrated circuit
Intel Management Engine
The Intel Management Engine (ME), also known as the Intel Manageability Engine, is an autonomous subsystem that has been incorporated in virtually all of Intel's processor chipsets since 2008.
See Hardware Trojan and Intel Management Engine
Kill switch
A kill switch, also known more formally as an emergency brake, emergency stop (E-stop), emergency off (EMO), or emergency power off (EPO), is a safety mechanism used to shut off machinery in an emergency, when it cannot be shut down in the usual manner.
See Hardware Trojan and Kill switch
KVM switch
A KVM switch (with KVM being an abbreviation for "keyboard, video, and mouse") is a hardware device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mouse.
See Hardware Trojan and KVM switch
Light-induced voltage alteration
Light-induced voltage alteration (LIVA) is a semiconductor analysis technique that uses a laser or infrared light source to induce voltage changes in a device while scanning the beam of light across its surface.
See Hardware Trojan and Light-induced voltage alteration
Logic gate
A logic gate is a device that performs a Boolean function, a logical operation performed on one or more binary inputs that produces a single binary output.
See Hardware Trojan and Logic gate
Military
A military, also known collectively as an armed forces, are a heavily armed, highly organized force primarily intended for warfare.
See Hardware Trojan and Military
Missile
A missile is an airborne ranged weapon capable of self-propelled flight aided usually by a propellant, jet engine or rocket motor.
See Hardware Trojan and Missile
Outsourcing
Outsourcing is a business practice in which companies use external providers to carry out business processes that would otherwise be handled internally, or in-house.
See Hardware Trojan and Outsourcing
Payload (computing)
In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message.
See Hardware Trojan and Payload (computing)
Pentium FDIV bug
The Pentium FDIV bug is a hardware bug affecting the floating-point unit (FPU) of the early Intel Pentium processors.
See Hardware Trojan and Pentium FDIV bug
Peripheral
A peripheral device, or simply peripheral, is an auxiliary hardware device that a computer uses to transfer information externally.
See Hardware Trojan and Peripheral
Physical unclonable function
A physical unclonable function (sometimes also called physically-unclonable function, which refers to a weaker security metric than a physical unclonable function), or PUF, is a physical object whose operation cannot be reproduced ("cloned") in physical way (by making another system using the same technology), that for a given input and conditions (challenge), provides a physically defined "digital fingerprint" output (response).
See Hardware Trojan and Physical unclonable function
Radio
Radio is the technology of communicating using radio waves.
Radio wave
Radio waves are a type of electromagnetic radiation with the lowest frequencies and the longest wavelengths in the electromagnetic spectrum, typically with frequencies below 300 gigahertz (GHz) and wavelengths greater than, about the diameter of a grain of rice.
See Hardware Trojan and Radio wave
Sabotage
Sabotage is a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization, destabilization, division, disruption, or destruction.
See Hardware Trojan and Sabotage
Scan chain
Scan chain is a technique used in design for testing.
See Hardware Trojan and Scan chain
Scanning electron microscope
A scanning electron microscope (SEM) is a type of electron microscope that produces images of a sample by scanning the surface with a focused beam of electrons.
See Hardware Trojan and Scanning electron microscope
Security switch
A security switch is a hardware device designed to protect computers, laptops, smartphones and similar devices from unauthorized access or operation, distinct from a virtual security switch which offers software protection.
See Hardware Trojan and Security switch
Semiconductor intellectual property core
In electronic design, a semiconductor intellectual property core (SIP core), IP core or IP block is a reusable unit of logic, cell, or integrated circuit layout design that is the intellectual property of one party.
See Hardware Trojan and Semiconductor intellectual property core
Sensor
A sensor is a device that produces an output signal for the purpose of detecting a physical phenomenon.
See Hardware Trojan and Sensor
Sequential logic
In automata theory, sequential logic is a type of logic circuit whose output depends on the present value of its input signals and on the sequence of past inputs, the input history.
See Hardware Trojan and Sequential logic
Side-channel attack
In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g. flaws found in a cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights in the implementation.
See Hardware Trojan and Side-channel attack
Technology
Technology is the application of conceptual knowledge to achieve practical goals, especially in a reproducible way.
See Hardware Trojan and Technology
Transistor
A transistor is a semiconductor device used to amplify or switch electrical signals and power.
See Hardware Trojan and Transistor
Trojan horse (computing)
In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program.
See Hardware Trojan and Trojan horse (computing)
USB
Universal Serial Bus (USB) is an industry standard that allows data exchange and delivery of power between many types of electronics.
See also
Computer hardware
- 4D vector
- ASRock M8
- B5000 instruction set
- Cache hierarchy
- Classes of computers
- Clock signal
- Computer compatibility
- Computer hardware
- Computer terminals
- Electronic badge
- Emulator
- Fingerprint scanner
- Flat-panel display
- GPU switching
- General-Purpose Serial Interface
- Hardware Trojan
- Hardware acceleration
- Hardware backdoor
- Hardware compatibility list
- Hardware for artificial intelligence
- Hardware reset
- Hardware security
- Hardware virtualization
- Hardware-based encryption
- History of computing hardware
- Honeywell JetWave
- Librem
- List of search appliance vendors
- Mini-STX
- Nitro Zeus
- Packard Bell Statesman
- Photonically Optimized Embedded Microprocessors
- Plug compatible
- Power cycling
- Randomized benchmarking
- Secure element
- Vintage computer
- Vinyl cutter
- X2 transceiver
- Zero-overhead looping
References
[1] https://en.wikipedia.org/wiki/Hardware_Trojan
Also known as Hardware Trojan (computing).