Hardware Security of CE Devices

被引:15
|
作者
Sengupta, Anirban [1 ]
机构
[1] Indian Inst Technol, Comp Sci & Engn, Res Lab Architectural Synth Adapt Computat, Indore, Madhya Pradesh, India
关键词
D O I
10.1109/MCE.2016.2614552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In my previous columns, I have covered various topics, including the evolution of the intellectual property core industry, digital integrated circuit (IC) design flow, high-level perspectives on intellectual property (IP) cores, and the transient fault resiliency of IP cores. Though one of my previous columns focused on providing a generic cognizance about the protection of reusable IP cores, it did not delve deep into the threat models and defense mechanisms against hardware trojans and IP piracy. This column discusses hardware security of consumer electronics (CE) devices, focusing primarily on threat models and defense mechanisms against two major attacks: hardware trojans and IP piracy. © 2012 IEEE.
引用
收藏
页码:130 / 133
页数:4
相关论文
共 50 条
  • [21] Hardware/Software Isolation and Protection Architecture for Transparent Security Enforcement in Networked Devices
    Hategekimana, Festus
    Nardin, Pierre
    Bobda, Christophe
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 140 - 145
  • [22] Hardware and Information Security Primitives Based on 2D Materials and Devices
    Wali, Akshay
    Das, Saptarshi
    ADVANCED MATERIALS, 2023, 35 (18)
  • [23] Mutual Authentication Protocol using ECC and Hardware Security Module for IoT Devices
    Lee, Suk Jin
    Salman, Ahmad
    Chang, Hsuan-Yun
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [24] Physical Unclonable Function Based Hardware Security for Resource Constraint IoT Devices
    Ahmed, Muhammed Kawser
    Yanambaka, Venkata P.
    Abdelgawad, Ahmed
    Yelamarthi, Kumar
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [25] Experimental analysis of variability in WS2-based devices for hardware security
    Vatalaro, M.
    Neill, H.
    Gity, F.
    Magnone, P.
    Maccaronio, V.
    Marquez, C.
    Galdon, J. C.
    Gamiz, F.
    Crupi, F.
    Hurley, P.
    De Rose, R.
    SOLID-STATE ELECTRONICS, 2023, 207
  • [26] A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols
    Wang, An
    Li, Zheng
    Yang, Xianwen
    Yu, Yanyan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 386 - 400
  • [27] Re-envisioning Digital Architectures Connecting CE Hardware for Security, Reliability and Low Energy
    Whittington, Christopher
    Cady, Edward
    Ratchen, Daniel
    Dawji, Yunus
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [28] Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime
    Patnaik, Satwik
    Rangarajan, Nikhil
    Knechtel, Johann
    Sinanoglu, Ozgur
    Rakheja, Shaloo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (08) : 1591 - 1606
  • [29] A novel trusted hardware-based scalable security framework for IoT edge devices
    Khan M.
    Hatami M.
    Zhao W.
    Chen Y.
    Discover Internet of Things, 2024, 4 (01):
  • [30] Using Reconfigurable Hardware Devices in WSNs for Reducing the Energy Consumption of Routing and Security Tasks
    Mplemenos, Georgios-Grigorios
    Papadopoulos, Konstantinos
    Papaefstathiou, Ioannis
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,