en.unionpedia.org

Hardware Trojan, the Glossary

Index Hardware Trojan

A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit.[1]

Table of Contents

  1. 45 relations: Antenna (radio), Application-specific integrated circuit, Built-in self-test, Chain of custody, Charge-induced voltage alteration, Checksum, Combinational logic, Cryptography, Dakshi Agrawal, Design for testing, Economy, Electronic circuit, Energy, Finance, Hardware backdoor, Hardware obfuscation, Hardware security, High availability, Integrated circuit, Intel Management Engine, Kill switch, KVM switch, Light-induced voltage alteration, Logic gate, Military, Missile, Outsourcing, Payload (computing), Pentium FDIV bug, Peripheral, Physical unclonable function, Radio, Radio wave, Sabotage, Scan chain, Scanning electron microscope, Security switch, Semiconductor intellectual property core, Sensor, Sequential logic, Side-channel attack, Technology, Transistor, Trojan horse (computing), USB.

  2. Computer hardware

Antenna (radio)

In radio engineering, an antenna (American English) or aerial (British English) is the interface between radio waves propagating through space and electric currents moving in metal conductors, used with a transmitter or receiver.

See Hardware Trojan and Antenna (radio)

Application-specific integrated circuit

An application-specific integrated circuit (ASIC) is an integrated circuit (IC) chip customized for a particular use, rather than intended for general-purpose use, such as a chip designed to run in a digital voice recorder or a high-efficiency video codec.

See Hardware Trojan and Application-specific integrated circuit

Built-in self-test

A built-in self-test (BIST) or built-in test (BIT) is a mechanism that permits a machine to test itself.

See Hardware Trojan and Built-in self-test

Chain of custody

Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence.

See Hardware Trojan and Chain of custody

Charge-induced voltage alteration

Charge-induced voltage alteration (CIVA) is a technique which uses a scanning electron microscope to locate open conductors on CMOS integrated circuits.

See Hardware Trojan and Charge-induced voltage alteration

Checksum

A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage.

See Hardware Trojan and Checksum

Combinational logic

In automata theory, combinational logic (also referred to as time-independent logic) is a type of digital logic that is implemented by Boolean circuits, where the output is a pure function of the present input only.

See Hardware Trojan and Combinational logic

Cryptography

Cryptography, or cryptology (from κρυπτός|translit.

See Hardware Trojan and Cryptography

Dakshi Agrawal

Dakshi Agrawal, from the IBM Thomas J. Watson Research Center, Yorktown Heights, New York.

See Hardware Trojan and Dakshi Agrawal

Design for testing

Design for testing or design for testability (DFT) consists of IC design techniques that add testability features to a hardware product design.

See Hardware Trojan and Design for testing

Economy

An economy is an area of the production, distribution and trade, as well as consumption of goods and services.

See Hardware Trojan and Economy

Electronic circuit

An electronic circuit is composed of individual electronic components, such as resistors, transistors, capacitors, inductors and diodes, connected by conductive wires or traces through which electric current can flow.

See Hardware Trojan and Electronic circuit

Energy

Energy is the quantitative property that is transferred to a body or to a physical system, recognizable in the performance of work and in the form of heat and light.

See Hardware Trojan and Energy

Finance

Finance refers to monetary resources and to the study and discipline of money, currency and capital assets.

See Hardware Trojan and Finance

Hardware backdoor

Hardware backdoors are backdoors in hardware, such as code inside hardware or firmware of computer chips. Hardware Trojan and hardware backdoor are computer hardware.

See Hardware Trojan and Hardware backdoor

Hardware obfuscation

Hardware obfuscation is a technique by which the description or the structure of electronic hardware is modified to intentionally conceal its functionality, which makes it significantly more difficult to reverse-engineer.

See Hardware Trojan and Hardware obfuscation

Hardware security

Hardware security is a discipline originated from the cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things. Hardware Trojan and hardware security are computer hardware.

See Hardware Trojan and Hardware security

High availability

High availability (HA) is a characteristic of a system that aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period.

See Hardware Trojan and High availability

Integrated circuit

An integrated circuit (IC), also known as a microchip, computer chip, or simply chip, is a small electronic device made up of multiple interconnected electronic components such as transistors, resistors, and capacitors.

See Hardware Trojan and Integrated circuit

Intel Management Engine

The Intel Management Engine (ME), also known as the Intel Manageability Engine, is an autonomous subsystem that has been incorporated in virtually all of Intel's processor chipsets since 2008.

See Hardware Trojan and Intel Management Engine

Kill switch

A kill switch, also known more formally as an emergency brake, emergency stop (E-stop), emergency off (EMO), or emergency power off (EPO), is a safety mechanism used to shut off machinery in an emergency, when it cannot be shut down in the usual manner.

See Hardware Trojan and Kill switch

KVM switch

A KVM switch (with KVM being an abbreviation for "keyboard, video, and mouse") is a hardware device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mouse.

See Hardware Trojan and KVM switch

Light-induced voltage alteration

Light-induced voltage alteration (LIVA) is a semiconductor analysis technique that uses a laser or infrared light source to induce voltage changes in a device while scanning the beam of light across its surface.

See Hardware Trojan and Light-induced voltage alteration

Logic gate

A logic gate is a device that performs a Boolean function, a logical operation performed on one or more binary inputs that produces a single binary output.

See Hardware Trojan and Logic gate

Military

A military, also known collectively as an armed forces, are a heavily armed, highly organized force primarily intended for warfare.

See Hardware Trojan and Military

Missile

A missile is an airborne ranged weapon capable of self-propelled flight aided usually by a propellant, jet engine or rocket motor.

See Hardware Trojan and Missile

Outsourcing

Outsourcing is a business practice in which companies use external providers to carry out business processes that would otherwise be handled internally, or in-house.

See Hardware Trojan and Outsourcing

Payload (computing)

In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message.

See Hardware Trojan and Payload (computing)

Pentium FDIV bug

The Pentium FDIV bug is a hardware bug affecting the floating-point unit (FPU) of the early Intel Pentium processors.

See Hardware Trojan and Pentium FDIV bug

Peripheral

A peripheral device, or simply peripheral, is an auxiliary hardware device that a computer uses to transfer information externally.

See Hardware Trojan and Peripheral

Physical unclonable function

A physical unclonable function (sometimes also called physically-unclonable function, which refers to a weaker security metric than a physical unclonable function), or PUF, is a physical object whose operation cannot be reproduced ("cloned") in physical way (by making another system using the same technology), that for a given input and conditions (challenge), provides a physically defined "digital fingerprint" output (response).

See Hardware Trojan and Physical unclonable function

Radio

Radio is the technology of communicating using radio waves.

See Hardware Trojan and Radio

Radio wave

Radio waves are a type of electromagnetic radiation with the lowest frequencies and the longest wavelengths in the electromagnetic spectrum, typically with frequencies below 300 gigahertz (GHz) and wavelengths greater than, about the diameter of a grain of rice.

See Hardware Trojan and Radio wave

Sabotage

Sabotage is a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization, destabilization, division, disruption, or destruction.

See Hardware Trojan and Sabotage

Scan chain

Scan chain is a technique used in design for testing.

See Hardware Trojan and Scan chain

Scanning electron microscope

A scanning electron microscope (SEM) is a type of electron microscope that produces images of a sample by scanning the surface with a focused beam of electrons.

See Hardware Trojan and Scanning electron microscope

Security switch

A security switch is a hardware device designed to protect computers, laptops, smartphones and similar devices from unauthorized access or operation, distinct from a virtual security switch which offers software protection.

See Hardware Trojan and Security switch

Semiconductor intellectual property core

In electronic design, a semiconductor intellectual property core (SIP core), IP core or IP block is a reusable unit of logic, cell, or integrated circuit layout design that is the intellectual property of one party.

See Hardware Trojan and Semiconductor intellectual property core

Sensor

A sensor is a device that produces an output signal for the purpose of detecting a physical phenomenon.

See Hardware Trojan and Sensor

Sequential logic

In automata theory, sequential logic is a type of logic circuit whose output depends on the present value of its input signals and on the sequence of past inputs, the input history.

See Hardware Trojan and Sequential logic

Side-channel attack

In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g. flaws found in a cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights in the implementation.

See Hardware Trojan and Side-channel attack

Technology

Technology is the application of conceptual knowledge to achieve practical goals, especially in a reproducible way.

See Hardware Trojan and Technology

Transistor

A transistor is a semiconductor device used to amplify or switch electrical signals and power.

See Hardware Trojan and Transistor

Trojan horse (computing)

In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program.

See Hardware Trojan and Trojan horse (computing)

USB

Universal Serial Bus (USB) is an industry standard that allows data exchange and delivery of power between many types of electronics.

See Hardware Trojan and USB

See also

Computer hardware

References

[1] https://en.wikipedia.org/wiki/Hardware_Trojan

Also known as Hardware Trojan (computing).