Trojan Taxonomy Chapter uri icon


  • 2012 Springer Science+Business Media, LLC. All rights reserved. With the steady increase in outsourcing of semiconductor integrated circuits (ICs) manufacturing, the concerns for malicious inclusions are increasing within the military and the commercial sectors. Recently, Trojans in ICs used by military equipment have been reported [1]. Trojans can change the functionality of an IC and affect mission critical equipment. Trojans can also disable a system at will. These concerns caused the Defense Advanced Research Projects Agency (DARPA) to initiate the Trust in ICs program. This program focuses on developing Trojan detection methods [2, 3].

author list (cited authors)

  • Karri, R., Rajendran, J., & Rosenfeld, K.

citation count

  • 23

complete list of authors

  • Karri, Ramesh||Rajendran, Jeyavijayan||Rosenfeld, Kurt

Book Title

  • Introduction to Hardware Security and Trust

publication date

  • October 2012