Author_Institution :
Univ. of California, Los Angeles, CA, USA
Abstract :
The paper discusses hardware security. The author mention that there were best times and worst times for hardware security. Numerous factors facilitate, both qualitatively and quantitatively an essentially unlimited potential for attacks. Factors include an increasingly popular and profitable horizontal semiconductor business model, sharply reduced controllability and observability ultracheap silicon, expensive testing, ultra-large-scale integration, manufacturing variability aging, thermal and operational sensitivity, crosstalk, and many other physical properties of deep submicron technologies. Hardware Trojan horses, physical unclonable functions, cryptography were some of the issues mentioned and discussed in this paper.
Keywords :
cryptography; integrated circuit design; invasive software; microprocessor chips; crosstalk; cryptography; expensive testing; hardware Trojan horses; hardware security; manufacturing variability aging; physical unclonable functions; semiconductor business model; sensitivity; silicon controllability; silicon observability; ultra-large-scale integration; Aging; Controllability; Hardware; Observability; Security; Semiconductor device manufacture; Semiconductor device testing; Silicon; Ultra large scale integration; Virtual manufacturing; PUFs; cryptographic protocol; hardware security; physical unclonable functions;