Inserting Trojans in design flow: Very Possible
Inserting Trojans in IC as
transistors/polygons
- Expert opinion from design/test:
Not possible
Spare gates (counted in 10s of gates)
not much help
Any mistake by attacker very
noticeable
must be perfect first time not possible
Need to communicate with outside world
(I/O)
-To be effective in terms of when to attack
- Need to get to IC through system resources
- Time bombs, metal migration - not strategic
Where should we be digging?