• DocumentCode
    659085
  • Title

    Hardware security: Threat models and metrics

  • Author

    Rostami, Mohamad ; Koushanfar, Farinaz ; Rajendran, Jeyavijayan ; Karri, Ramesh

  • Author_Institution
    Rice Univ., Houston, TX, USA
  • fYear
    2013
  • fDate
    18-21 Nov. 2013
  • Firstpage
    819
  • Lastpage
    823
  • Abstract
    The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.
  • Keywords
    invasive software; microprocessor chips; reverse engineering; counterfeiting; globalized semiconductor supply chain; hardware attacks; hardware security; integrated circuit overbuilding; intellectual property piracy; reverse engineering; side-channels; threat metrics; threat models; trojans; Hardware; Integrated circuit modeling; Logic gates; Measurement; Trojan horses; Camouflaging; Counterfeiting; Hardware Trojans; IP/IC Piracy; Reverse Engineering; Side-Channel Attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer-Aided Design (ICCAD), 2013 IEEE/ACM International Conference on
  • Conference_Location
    San Jose, CA
  • ISSN
    1092-3152
  • Type

    conf

  • DOI
    10.1109/ICCAD.2013.6691207
  • Filename
    6691207