Notice
This item was automatically migrated from a legacy system. It's data has not been checked and might not meet the quality criteria of the present system.
Krieg, C., & Weippl, E. (2013). Malware in Hardware Infrastructure Components. In Advances in IT Early Warning. Fraunhofer IRB Verlag. http://hdl.handle.net/20.500.12708/28197
E194-01 - Forschungsbereich Information und Software Engineering
-
Published in:
Advances in IT Early Warning
-
Date (published):
2013
-
Number of Pages:
1
-
Peer reviewed:
No
-
Abstract:
Malicious hardware is a fairly new research topic that has attracted the interest
of the scienti c community. Therefore, numerous approaches have been proposed
in the last years to counter the threat of so-called
hardware
Trojans
. This chapter
describes malicious hardware in the context of the security of hardware infrastruc-
ture components. Network infrastructure plays a vital role in ou...
Malicious hardware is a fairly new research topic that has attracted the interest
of the scienti c community. Therefore, numerous approaches have been proposed
in the last years to counter the threat of so-called
hardware
Trojans
. This chapter
describes malicious hardware in the context of the security of hardware infrastruc-
ture components. Network infrastructure plays a vital role in our everyday lives,
since many services depend on reliable and secure connections. In the following, we
brie y introduce the topic of hardware
Trojans
. After describing their basic compo-
nents, we give some insights into how hardware
Trojans
can be used maliciously in
infrastructure devices. Furthermore, we outline the evolution of hardware
Trojans
and measures to counter them