+

Al-Anwar et al., 2013 - Google Patents

Defeating hardware spyware in third party IPs

Al-Anwar et al., 2013

View PDF
Document ID
10028822550603136555
Author
Al-Anwar A
Alkabani Y
El-Kharashi M
Bedour H
Publication year
Publication venue
2013 Saudi International Electronics, Communications and Photonics Conference

External Links

Snippet

Hardware spyware detection is a very critical topic, especially as untrusted third parties contribute in designing and/or manufacturing. Comparing a suspected design with a golden one is the most common way to detect hardware Trojans. But, this methodology cannot be …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Similar Documents

Publication Publication Date Title
Xue et al. Ten years of hardware Trojans: a survey from the attacker's perspective
Rostami et al. A primer on hardware security: Models, methods, and metrics
Tehranipoor et al. A survey of hardware trojan taxonomy and detection
Jin et al. Experiences in hardware trojan design and implementation
Becker et al. Stealthy dopant-level hardware trojans
Koteshwara et al. Key-based dynamic functional obfuscation of integrated circuits using sequentially triggered mode-based design
Li et al. A survey of hardware Trojan threat and defense
Chakraborty et al. Hardware Trojan: Threats and emerging solutions
Jacob et al. Hardware Trojans: current challenges and approaches
Dupuis et al. A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans
Becker et al. Stealthy dopant-level hardware trojans: extended version
Chakraborty et al. A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis
Karri et al. Trustworthy hardware: Identifying and classifying hardware trojans
Tehranipoor et al. A survey of hardware trojan taxonomy and detection
Moore et al. Balanced self-checking asynchronous logic for smart card applications
Li et al. A survey of hardware trojan detection, diagnosis and prevention
US10599847B2 (en) Implementations to facilitate hardware trust and security
Al-Anwar et al. Hardware Trojan detection methodology for FPGA
Becker et al. Implementing hardware trojans: Experiences from a hardware trojan challenge
Elnaggar et al. Security against data-sniffing and alteration attacks in IJTAG
Kasper et al. Side channels as building blocks
Guilley et al. Fault injection resilience
Al-Anwar et al. Hardware trojan protection for third party IPs
Jin et al. DFTT: Design for Trojan test
Al-Anwar et al. Defeating hardware spyware in third party IPs
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载