Copyright © Intellitech Corp. 2010. All rights reserved.
Inserting Trojans in design flow:
Inserting Trojans in IC as transistors/polygons
- Expert opinion from design/test:
Spare gates (counted in 10s of gates) not much help
Any mistake by attacker very noticeable
must be perfect first time not possible
Need to communicate with outside world (I/O)
-To be effective in terms of when to attack
- Need to get to IC through system resources
- Time bombs, metal migration - not strategic
Where should we be digging?