Baumgarten et al., 2011 - Google Patents
A case study in hardware Trojan design and implementationBaumgarten et al., 2011
View PDF- Document ID
- 8724507120676906951
- Author
- Baumgarten A
- Steffen M
- Clausman M
- Zambreno J
- Publication year
- Publication venue
- International Journal of Information Security
External Links
Snippet
As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication …
- 238000004519 manufacturing process 0 abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Baumgarten et al. | A case study in hardware Trojan design and implementation | |
Xue et al. | Ten years of hardware Trojans: a survey from the attacker's perspective | |
Sidhu et al. | Hardware security in IoT devices with emphasis on hardware trojans | |
Liang et al. | A double PUF-based RFID identity authentication protocol in service-centric internet of things environments | |
Zhang et al. | Recent attacks and defenses on FPGA-based systems | |
Rostami et al. | A primer on hardware security: Models, methods, and metrics | |
Wendt et al. | Hardware obfuscation using PUF-based logic | |
Drimer | Security for volatile FPGAs | |
Clark | Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments | |
Jin et al. | Security of cloud FPGAs: A survey | |
Drimer | Volatile FPGA design security–a survey | |
Akter et al. | A survey on hardware security: Current trends and challenges | |
Konigsmark et al. | System-of-PUFs: Multilevel security for embedded systems | |
Van Woudenberg et al. | The hardware hacking handbook: breaking embedded security with hardware attacks | |
Yang et al. | An RFID-based technology for electronic component and system counterfeit detection and traceability | |
Chang et al. | Hardware IP watermarking and fingerprinting | |
Halak | Cist: A threat modelling approach for hardware supply chain security | |
Sami et al. | Poca: First power-on chip authentication in untrusted foundry and assembly | |
Kasper et al. | Side channels as building blocks | |
Roy et al. | Device-specific security challenges and solution in IoT edge computing: a review | |
Kokila et al. | Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applications | |
Hutle et al. | Resilience against physical attacks | |
Gao et al. | A novel approximate computing based security primitive for the Internet of Things | |
Krishnamurthy et al. | Multi-modal side channel data driven golden-free detection of software and firmware Trojans | |
Yu et al. | Hardware hardening approaches using camouflaging, encryption, and obfuscation |