ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article 하드웨어 트로이목마 탐지기술 동향
Cited - time in scopus Download 151 time Share share facebook twitter linkedin kakaostory
Authors
최양서, 이상수, 최용제, 김대원, 최병철
Issue Date
2021-12
Citation
전자통신동향분석, v.36, no.6, pp.78-87
ISSN
1225-6455
Publisher
한국전자통신연구원
Language
Korean
Type
Journal Article
DOI
https://dx.doi.org/10.22648/ETRI.2021.J.360608
Abstract
Information technology (IT) has been applied to various fields, and currently, IT devices and systems are used in very important areas, such as aviation, industry, and national defense. Such devices and systems are subject to various types of malicious attacks, which can be software or hardware based. Compared to software-based attacks, hardware-based attacks are known to be much more difficult to detect. A hardware Trojan horse is a representative example of hardware-based attacks. A hardware Trojan horse attack inserts a circuit into an IC chip. The inserted circuit performs malicious actions, such as causing a system malfunction or leaking important information. This has increased the potential for attack in the current supply chain environment, which is jointly developed by various companies. In this paper, we discuss the future direction of research by introducing attack cases, the characteristics of hardware Trojan horses, and countermeasure trends.
KSP Keywords
And systems, Hardware Trojan Horses(HTH), IC chip, Information Technology, National Defense, Trojan horse attack, current supply, hardware based, malicious attacks, supply chain
This work is distributed under the term of Korea Open Government License (KOGL)
(Type 4: : Type 1 + Commercial Use Prohibition+Change Prohibition)
Type 4: