Trojan Horses, Computer Viruses and Worms

Tamper detection is the ability of a device to sense that it is under physical attack and initiate defensive actions through tamper response. The tamper detection design can be implemented to sense different types, techniques, and sophistication of tampering. Examples of techniques used to detect tampering may include any or all of the following; switches to detect the opening of doors or access covers, sensors to detect changes in light or pressure within the device, or a barrier or matrix to detect drilling or penetrating the device boundary. To be effective, the detection mechanism must be active regardless of the current logical state of the module.