전자기/회로 공동 시뮬레이션을 이용한 하드웨어 트로이목마 신호탈취 시스템의 모델링

Translated title of the contribution: Modeling of Hardware Trojan Signal Hijacking System Using EM/Circuit Co-Simulation

Research output: Contribution to journalArticlepeer-review

Abstract

The hijacking of critical information by inserting Hardware Trojans (HT) into electronic devices is a significant security threat.
Research on countermeasures against this threat has primarily relied on repeated experiments that require substantial time and resources.
This letter introduces a simulation study that models an HT-based signal hijacking system by incorporating multiple simulation software packages. To model a system where signals are modulated and backscattered by an active HT inserted into an operating electronic cir- cuit, three types of simulation software are used: full-wave electromagnetic analysis, circuit simulator, and signal integrity analysis tools.
With this co-simulation strategy, the effects of the external electromagnetic wave frequency, HT location, distance, and polarization of the transmitting and receiving antennas on the backscattered signals can be examined. This is useful for understanding HT-based information hijacking systems and developing countermeasure technologies.
Translated title of the contributionModeling of Hardware Trojan Signal Hijacking System Using EM/Circuit Co-Simulation
Original languageKorean
Pages (from-to)622-626
Number of pages5
Journal한국전자파학회 논문지
Volume35
Issue number8
DOIs
StatePublished - 2024

Fingerprint

Dive into the research topics of 'Modeling of Hardware Trojan Signal Hijacking System Using EM/Circuit Co-Simulation'. Together they form a unique fingerprint.

Cite this