{"title":"Malicious hardware: Characteristics, classification and formal models","authors":"V. Gorbachov","doi":"10.1109/EWDTS.2014.7027092","DOIUrl":null,"url":null,"abstract":"The paper addresses the threat to the security of using electronic systems, which may include malicious inclusions. The action classification of malicious hardware (MH) is given. The MH formal models, as well as formal model of unauthorized access, executed by MH, are based on the subject-object concept.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EWDTS.2014.7027092","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The paper addresses the threat to the security of using electronic systems, which may include malicious inclusions. The action classification of malicious hardware (MH) is given. The MH formal models, as well as formal model of unauthorized access, executed by MH, are based on the subject-object concept.