MC8051-T500

Contributed by Hassan Salmani; University of Connecticut

Abstract:

The Trojan replaces some data such that only an attacker can analyze the output. The Trojan trigger detects a specific command, and The Trojan payload replaces specific data after Trojan activation.

[none]