• DocumentCode
    129028
  • Title

    Hacking and protecting IC hardware

  • Author

    Hamdioui, Said ; Danger, Jean-Luc ; Di Natale, G. ; Smailbegovic, Fethulah ; van Battum, Gerard ; Tehranipoor, Mohammad

  • Author_Institution
    Comput. Eng. Delft Univ. of Technol., Delft, Netherlands
  • fYear
    2014
  • fDate
    24-28 March 2014
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Traditionally most of people treat a hardware solution as an inherently trusted box. “it is hardware not software; so it is secure and trustworthy”, they say. Recent research shows the need to re-asses this trust in hardware and even in its supply chain. For example, attacks are performed on ICs to retrieve secret information such as cryptographic keys. Moreover, backdoors can be inserted into electronic designs and allow for silent intruders into the system. And, even protecting intellectual-property is becoming a serious concern in the modern globalized, horizontal semiconductor business model. This paper discusses hardware security, both from hacking and protecting aspects. A classification of all possible hardware attacks is provided and most popular attacks are discussed including the countermeasures.
  • Keywords
    computer crime; cryptography; microprocessor chips; supply chains; IC hardware protection; cryptographic keys; electronic designs; hacking; hardware attacks; hardware security; intellectual property; secret information; semiconductor business model; silent intruders; supply chain; Circuit faults; Computer crime; Cryptography; Hardware; Integrated circuits; Supply chains; Trojan horses; Hardware Trojans; Site-channel attacks; counterfeiting; fault injection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014
  • Conference_Location
    Dresden
  • Type

    conf

  • DOI
    10.7873/DATE.2014.112
  • Filename
    6800313