DocumentCode :
146179
Title :
T1A: Opportunities and challenges for secure hardware and verifying trust in integrated circuits
Author :
Tehranipoor, Mohammad ; Knapp, Charles
Author_Institution :
Center for Hardware Assurance, Security, & Eng., Univ. of Connecticut, Storrs, CT, USA
fYear :
2014
fDate :
2-5 Sept. 2014
Abstract :
Summary form only given. The migration from a vertical to horizontal business model has made it easier to introduce many vulnerabilities to electronic component design and supply chain. In the first part of this tutorial, we discuss the major issues that must be addressed including securing hardware, verifying trustworthiness of integrated circuits, unique key generation, side-channel attacks and more. In the latter two parts of this tutorial, we will place more emphasis on detection and prevention of hardware Trojans and counterfeit electronic parts and discuss how test can help. In this tutorial, we will cover (i) An introduction to hardware security and trust (physically unclonable functions, true random number generation, hardware Trojans, counterfeit ICs, sidechannel attacks, supply chain vulnerabilities, etc.), (ii) Background and motivation for hardware Trojan and counterfeit prevention/detection; (iii) Taxonomies related to both topics; (iv) Existing solutions; (v) Open test challenges; (vi) Design for security and trust, (vii) New and unified solutions to address these challenges.
Keywords :
integrated circuits; invasive software; electronic component design; hardware Trojan detection; hardware Trojan prevention; hardware security; horizontal business model; integrated circuits; key generation; side-channel attacks; supply chain; trustworthiness verification; vertical business model; Engineering profession;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
System-on-Chip Conference (SOCC), 2014 27th IEEE International
Conference_Location :
Las Vegas, NV
Type :
conf
DOI :
10.1109/SOCC.2014.6948881
Filename :
6948881
Link To Document :
بازگشت