Hardware Security of CE Devices

被引:15
|
作者
Sengupta, Anirban [1 ]
机构
[1] Indian Inst Technol, Comp Sci & Engn, Res Lab Architectural Synth Adapt Computat, Indore, Madhya Pradesh, India
关键词
D O I
10.1109/MCE.2016.2614552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In my previous columns, I have covered various topics, including the evolution of the intellectual property core industry, digital integrated circuit (IC) design flow, high-level perspectives on intellectual property (IP) cores, and the transient fault resiliency of IP cores. Though one of my previous columns focused on providing a generic cognizance about the protection of reusable IP cores, it did not delve deep into the threat models and defense mechanisms against hardware trojans and IP piracy. This column discusses hardware security of consumer electronics (CE) devices, focusing primarily on threat models and defense mechanisms against two major attacks: hardware trojans and IP piracy. © 2012 IEEE.
引用
收藏
页码:130 / 133
页数:4
相关论文
共 50 条
  • [1] Hardware Vulnerabilities and Their Effects on CE Devices: Design for Security Against Trojans
    Sengupta, Anirban
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2017, 6 (03) : 126 - 133
  • [2] Hardware Security in IoT Devices with Emphasis on Hardware Trojans
    Sidhu, Simranjeet
    Mohd, Bassam J.
    Hayajneh, Thaier
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (03)
  • [3] Hardware Devices Security, their Vulnerabilities and Solutions
    Qayyum, Sundus
    Ashraf, Sajjad
    Shafique, Muzammal
    Waheed, Salman
    PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 439 - 445
  • [4] Neurocomputing and Hardware Security with Memory Devices
    Strukov, Dmitri B.
    2019 IEEE WORKSHOP ON MICROELECTRONICS AND ELECTRON DEVICES (WMED), 2019, : XV - XVI
  • [5] Determining security key the hardware for digital devices
    Zolotorevich, Ludmila A.
    Ilyinkov, Valery A.
    VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2022, (60): : 102 - 110
  • [6] Improving online baneing security with hardware devices
    Puente, F
    Sandoval, JD
    Hernández, P
    Molina, CJ
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 174 - 177
  • [7] Implementation of a Hardware Security Chip for Mobile Devices
    Ju, Hongil
    Kim, Youngsae
    Jeon, Yongsung
    Kim, Jeongnyeo
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2015, 61 (04) : 500 - 506
  • [8] Research and Development Priorities for Security of Embedded Hardware Devices
    Moghadasi, Negin
    Luu, Mai
    Adekunle, Rahman O.
    Polmateer, Thomas L.
    Manasco, Mark C.
    Emmert, John M.
    Lambert, James H.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 2800 - 2811
  • [9] Designing Low-Cost Hardware Accelerators for CE Devices
    Sarkar, Pallabi
    Sengupta, Anirban
    Rathlavat, Santosh
    Naskar, Mrinal Kanti
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2017, 6 (04) : 140 - 149
  • [10] Hardware Security of Fog End-Devices for the Internet of Things
    Butun, Ismail
    Sari, Alparslan
    Osterberg, Patrik
    SENSORS, 2020, 20 (20) : 1 - 28