Nothing Special   »   [go: up one dir, main page]

Baumgarten et al., 2011 - Google Patents

A case study in hardware Trojan design and implementation

Baumgarten et al., 2011

View PDF
Document ID
8724507120676906951
Author
Baumgarten A
Steffen M
Clausman M
Zambreno J
Publication year
Publication venue
International Journal of Information Security

External Links

Snippet

As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication …
Continue reading at www.ece.iastate.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Similar Documents

Publication Publication Date Title
Baumgarten et al. A case study in hardware Trojan design and implementation
Xue et al. Ten years of hardware Trojans: a survey from the attacker's perspective
Sidhu et al. Hardware security in IoT devices with emphasis on hardware trojans
Liang et al. A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
Zhang et al. Recent attacks and defenses on FPGA-based systems
Rostami et al. A primer on hardware security: Models, methods, and metrics
Wendt et al. Hardware obfuscation using PUF-based logic
Drimer Security for volatile FPGAs
Clark Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments
Jin et al. Security of cloud FPGAs: A survey
Drimer Volatile FPGA design security–a survey
Akter et al. A survey on hardware security: Current trends and challenges
Konigsmark et al. System-of-PUFs: Multilevel security for embedded systems
Van Woudenberg et al. The hardware hacking handbook: breaking embedded security with hardware attacks
Yang et al. An RFID-based technology for electronic component and system counterfeit detection and traceability
Chang et al. Hardware IP watermarking and fingerprinting
Halak Cist: A threat modelling approach for hardware supply chain security
Sami et al. Poca: First power-on chip authentication in untrusted foundry and assembly
Kasper et al. Side channels as building blocks
Roy et al. Device-specific security challenges and solution in IoT edge computing: a review
Kokila et al. Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applications
Hutle et al. Resilience against physical attacks
Gao et al. A novel approximate computing based security primitive for the Internet of Things
Krishnamurthy et al. Multi-modal side channel data driven golden-free detection of software and firmware Trojans
Yu et al. Hardware hardening approaches using camouflaging, encryption, and obfuscation