An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools
نویسندگان
چکیده
Hardware security and trust have become a pressing issue during the last two decades due to globalization of semiconductor supply chain ubiquitous network connection computing devices. Computing hardware is now an attractive attack surface for launching powerful cross-layer attacks, allowing attackers infer secret information, hijack control flow, compromise system root-of-trust, steal intellectual property (IP), fool machine learners. On other hand, practitioners been making tremendous efforts in developing protection techniques design tools detect vulnerabilities fortify against various known attacks. This article presents overview from perspectives threats, countermeasures, tools. By introducing most recent advances research developments, we aim motivate designers electronic automation tool developers consider new challenges opportunities incorporating additional dimension into robust design, testing, verification.
منابع مشابه
Smart Grid Cyber Security: An Overview of Threats and Countermeasures
The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. Fo...
متن کاملRFID Security and Privacy: Threats and Countermeasures
The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This research presents the RFID Threat Countermeasure Framework (RTCF) to better understand the wide ...
متن کاملCloud Computing Security threats and Countermeasures
Introduction Within the last decade, there have been several advances in technology that have created more opportunities for people to communicate around the world. Technology trends have reached not only the enterprise environments, but also in ordinary people's homes. Cloud computing implementation has revolutionized the tech community, and spread throughout the business world. It is no longe...
متن کاملThreats and Challenges in Reconfigurable Hardware Security
Computing systems designed using reconfigurable hardware are now used in many sensitive applications, where security is of utmost importance. Unfortunately, a strong notion of security is not currently present in FPGA hardware and software design flows. In the following, we discuss the security implications of using reconfigurable hardware in sensitive applications, and outline problems, attack...
متن کاملAn Overview of Threats and Security Software Solutions for Smartphones
The market of security software solutions for smartphones has grown considerably in the last years. A wide range of products is available. The objective of our paper is to develop an overview of security software solutions for smartphones. At first we identify typical threats and security measures for smartphones. Then we explore current security software solutions and describe how these can be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
سال: 2021
ISSN: ['1937-4151', '0278-0070']
DOI: https://doi.org/10.1109/tcad.2020.3047976