동향

하드웨어 트로이목마 탐지기술 동향

분야

전기/전자,정보/통신

발행기관

한국전자통신연구원

발행일

2021.12.01

URL


초록
Information technology (IT) has been applied to various fields, and currently, IT devices and systems are used in very important areas, such as aviation, industry, and national defense. Such devices and systems are subject to various types of malicious attacks, which can be software or hardware based. Compared to software-based attacks, hardware-based attacks are known to be much more difficult to detect. A hardware Trojan horse is a representative example of hardware-based attacks. A hardware Trojan horse attack inserts a circuit into an IC chip. The inserted circuit performs malicious actions, such as causing a system malfunction or leaking important information. This has increased the potential for attack in the current supply chain environment, which is jointly developed by various companies. In this paper, we discuss the future direction of research by introducing attack cases, the characteristics of hardware Trojan horses, and countermeasure trends.
 

Ⅰ. 서론

Ⅱ. 하드웨어 공급망 공격 사례

Ⅲ. 하드웨어 트로이목마

Ⅳ. 하드웨어 트로이목마 탐지기술 동향

Ⅴ. 결론

용어해설

약어 정리


자세한 내용은 첨부파일을 참고해 주시기 바랍니다.

리포트 평점  
해당 콘텐츠에 대한 회원님의 소중한 평가를 부탁드립니다.
0.0 (0개의 평가)
평가하기
등록된 댓글이 없습니다.