What kind of malicious actions a hardware Trojan can perform on IC? (provide at least 4)
1) The trojan would internally start working which means there is a way to monitoring either one or more signals present in the IC.
2) The malicious circuit would, in turn, wait for any logic to count down the chip added by an attacker in a way where the Trojan would awake after a particular time-span.
3) Once inclusion to the integrated circuit which in turn audit and monitor the malicious alteration or causing the performing any other malicious function.
4) There could be payload which would happen lead to the payload.
Please login or Register to submit your answer