In the final part of the cycle of review articles devoted to Hardware Trojans problems of maintaining system secure operation in the presence of Hardware Trojans are considered. To date no general countermeasures have yet been developed or proposed that would allow an IC to operate in a trustworthy manner in the presence of an arbitrary Hardware Trojan. Some aspects of such protection, details of its implementation and analyzing the general applicability of the countermeasures are discussed.


Разработка: студия Green Art