DocumentCode :
659085
Title :
Hardware security: Threat models and metrics
Author :
Rostami, Mohamad ; Koushanfar, Farinaz ; Rajendran, Jeyavijayan ; Karri, Ramesh
Author_Institution :
Rice Univ., Houston, TX, USA
fYear :
2013
fDate :
18-21 Nov. 2013
Firstpage :
819
Lastpage :
823
Abstract :
The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.
Keywords :
invasive software; microprocessor chips; reverse engineering; counterfeiting; globalized semiconductor supply chain; hardware attacks; hardware security; integrated circuit overbuilding; intellectual property piracy; reverse engineering; side-channels; threat metrics; threat models; trojans; Hardware; Integrated circuit modeling; Logic gates; Measurement; Trojan horses; Camouflaging; Counterfeiting; Hardware Trojans; IP/IC Piracy; Reverse Engineering; Side-Channel Attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer-Aided Design (ICCAD), 2013 IEEE/ACM International Conference on
Conference_Location :
San Jose, CA
ISSN :
1092-3152
Type :
conf
DOI :
10.1109/ICCAD.2013.6691207
Filename :
6691207
Link To Document :
بازگشت