An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools

نویسندگان

چکیده

Hardware security and trust have become a pressing issue during the last two decades due to globalization of semiconductor supply chain ubiquitous network connection computing devices. Computing hardware is now an attractive attack surface for launching powerful cross-layer attacks, allowing attackers infer secret information, hijack control flow, compromise system root-of-trust, steal intellectual property (IP), fool machine learners. On other hand, practitioners been making tremendous efforts in developing protection techniques design tools detect vulnerabilities fortify against various known attacks. This article presents overview from perspectives threats, countermeasures, tools. By introducing most recent advances research developments, we aim motivate designers electronic automation tool developers consider new challenges opportunities incorporating additional dimension into robust design, testing, verification.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smart Grid Cyber Security: An Overview of Threats and Countermeasures

The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. Fo...

متن کامل

RFID Security and Privacy: Threats and Countermeasures

The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This research presents the RFID Threat Countermeasure Framework (RTCF) to better understand the wide ...

متن کامل

Cloud Computing Security threats and Countermeasures

Introduction Within the last decade, there have been several advances in technology that have created more opportunities for people to communicate around the world. Technology trends have reached not only the enterprise environments, but also in ordinary people's homes. Cloud computing implementation has revolutionized the tech community, and spread throughout the business world. It is no longe...

متن کامل

Threats and Challenges in Reconfigurable Hardware Security

Computing systems designed using reconfigurable hardware are now used in many sensitive applications, where security is of utmost importance. Unfortunately, a strong notion of security is not currently present in FPGA hardware and software design flows. In the following, we discuss the security implications of using reconfigurable hardware in sensitive applications, and outline problems, attack...

متن کامل

An Overview of Threats and Security Software Solutions for Smartphones

The market of security software solutions for smartphones has grown considerably in the last years. A wide range of products is available. The objective of our paper is to develop an overview of security software solutions for smartphones. At first we identify typical threats and security measures for smartphones. Then we explore current security software solutions and describe how these can be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

سال: 2021

ISSN: ['1937-4151', '0278-0070']

DOI: https://doi.org/10.1109/tcad.2020.3047976