Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem
نویسندگان
چکیده
THE EMERGENCE OF a globalized, horizontal semiconductor business model raises concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware security and trust issues span a broad spectrum of topics ranging from the malicious insertion of Trojan circuits designed to act as a silicon time bomb to disable a chip upon activation, to intellectual property (IP) and IC piracy, to digital rights management, to untrusted third-party IP cores, to attacks designed to extract encryption keys and IP from a chip, and to malicious system disruption and diversion. Traditionally, hardware-based security techniques and countermeasures modify hardware to prevent attacks and to protect IP or secret keys. Some of the emerging types of attacks covered by this special issue are fundamentally different. The attacker is assumed to maliciously alter the design before or during fabrication. Trojans can be inserted into a circuit or system developed by a third-party IP vendor, system integrator, or foundry. Detection of such alterations (i.e., hardware Trojans) is extremely difficult since
منابع مشابه
Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems
متن کامل
Guest Editor\'s Note
Although Occupational Therapy in Iran is relatively a new profession, it has been well progressed, providing various services for people with all kinds of disabilities. As such, in the last decades, OT has been recognized as the major demand in all governmental, private and NGO sectors. Due to this demand, occupational therapy training programs have been increased from three into ten, expecting...
متن کاملGuest Editors’ Introduction: Special Issue on Problem-based Learning in Health Professions Education/Toward Advancement of Problem-Based Learning Research and Practice in Health Professions Education: Motivating Learners, Facilitating Processes, and Suppo
متن کامل
Guest Editors' Introduction to the Special Section on Probabilistic Graphical Models Accessed Terms of Use Detailed Terms Guest Editors' Introduction to the Special Section on Probabilistic Graphical Models
Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.
متن کاملSpecial Issue on RFID - Towards Ubiquitous Computing and the Web of Things: Guest Editors' Introduction
Ygal Bendavid Samuel Fosso Wamba Joseph Barjis Special Issue on RFID – Towards Ubiquitous Computing and the Web of Things: Guest Editors’ Introduction Journal of Theoretical and Applied Electronic Commerce Research ISSN 0718–1876 Electronic Version VOL 8 / ISSUE 2 / AUGUST 2013 / III-XI © 2013 Universidad de Talca Chile This paper is available online at www.jtaer.com DOI: 10.4067/S0718-18762013...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Design & Test of Computers
دوره 27 شماره
صفحات -
تاریخ انتشار 2010