Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem

نویسندگان

  • Mark Mohammad Tehranipoor
  • Farinaz Koushanfar
چکیده

THE EMERGENCE OF a globalized, horizontal semiconductor business model raises concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware security and trust issues span a broad spectrum of topics ranging from the malicious insertion of Trojan circuits designed to act as a silicon time bomb to disable a chip upon activation, to intellectual property (IP) and IC piracy, to digital rights management, to untrusted third-party IP cores, to attacks designed to extract encryption keys and IP from a chip, and to malicious system disruption and diversion. Traditionally, hardware-based security techniques and countermeasures modify hardware to prevent attacks and to protect IP or secret keys. Some of the emerging types of attacks covered by this special issue are fundamentally different. The attacker is assumed to maliciously alter the design before or during fabrication. Trojans can be inserted into a circuit or system developed by a third-party IP vendor, system integrator, or foundry. Detection of such alterations (i.e., hardware Trojans) is extremely difficult since

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guest Editor\'s Note

Although Occupational Therapy in Iran is relatively a new profession, it has been well progressed, providing various services for people with all kinds of disabilities. As such, in the last decades, OT has been recognized as the major demand in all governmental, private and NGO sectors. Due to this demand, occupational therapy training programs have been increased from three into ten, expecting...

متن کامل

Guest Editors' Introduction to the Special Section on Probabilistic Graphical Models Accessed Terms of Use Detailed Terms Guest Editors' Introduction to the Special Section on Probabilistic Graphical Models

Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.

متن کامل

Special Issue on RFID - Towards Ubiquitous Computing and the Web of Things: Guest Editors' Introduction

Ygal Bendavid Samuel Fosso Wamba Joseph Barjis Special Issue on RFID – Towards Ubiquitous Computing and the Web of Things: Guest Editors’ Introduction Journal of Theoretical and Applied Electronic Commerce Research ISSN 0718–1876 Electronic Version VOL 8 / ISSUE 2 / AUGUST 2013 / III-XI © 2013 Universidad de Talca Chile This paper is available online at www.jtaer.com DOI: 10.4067/S0718-18762013...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Design & Test of Computers

دوره 27  شماره 

صفحات  -

تاریخ انتشار 2010