Secured hardware design - An overview

被引:0
|
作者
Burugapalli, Sasikiran [1 ]
Al-Assadi, Waleed K. [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Elect & Comp Engn, Rolla, MO 65409 USA
来源
2008 IEEE REGION 5 CONFERENCE | 2008年
关键词
hardware attack; optical probing; thermal attack; electromagnetic attack; timing attack; soft errors;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security is a prime concern in the design of a wide variety of embedded systems and security processors. So the customer security devices such as smart cards and security processors are prone to attack and there are on going research to protect these devices from attackers who intend to extract key information from these devices. Also an active attacker can induce errors during computation and exploit the faulty result to extract the key information embedded in the processor. Due to the design time issues weakness in the design is often revealed in the manufactured chips. Also because the post-manufacture security evaluation is time consuming and expensive, these security issues have to be considered at the design phase. This paper outlines some of the hardware attacks and provides a general idea of the process of these attacks.
引用
收藏
页码:198 / 201
页数:4
相关论文
共 50 条
  • [1] Hardware design overview of a satellite scatterometer
    Crowley, RD
    PROCEEDINGS IEEE SOUTHEASTCON '98: ENGINEERING FOR A NEW ERA, 1998, : 244 - 247
  • [2] CMOS structures suitable for secured hardware
    Guilley, S
    Hoogvorst, P
    Mathieu, Y
    Pacalet, R
    Provost, J
    DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1414 - 1415
  • [3] Secured Hardware Design with Locker-Box Against a Key-Guessing Attacks
    Ranjani, R. Sree
    Devi, M. Nirmala
    JOURNAL OF LOW POWER ELECTRONICS, 2019, 15 (02) : 246 - 255
  • [4] An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools
    Hu, Wei
    Chang, Chip-Hong
    Sengupta, Anirban
    Bhunia, Swarup
    Kastner, Ryan
    Li, Hai
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1010 - 1038
  • [5] Body Sensor Networks: Overview of Hardware Framework and Design Challenges
    Nanjappan, Vijayakumar
    Wang, Wei
    Lau, Kim
    Man, Ka Lok
    Liang, Hai-Ning
    Lee, Jin Kyung
    Kim, Kyung Ki
    2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 175 - 176
  • [6] HARDWARE ALGORITHMS AND LOGIC DESIGN AUTOMATION - AN OVERVIEW AND PROGRESS REPORT
    YAJIMA, S
    YASUURA, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1983, 147 : 147 - 164
  • [7] Overview of Secured Web Services Specifications
    Mukherjee, Sudeep
    Beg, Rizwan
    Srivastava, Amit
    Khan, Riyazuddin
    2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT 2013), 2013, : 4 - 9
  • [8] A hardware-secured credential repository for grid PKIs
    Lorch, M
    Basney, J
    Kafura, D
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID - CCGRID 2004, 2004, : 640 - 647
  • [9] Design, simulation and hardware implementation of a Digital Television System: System overview
    Brito, Jose M. C.
    Mendes, Luciano L.
    Cardoso, Fabbryccio A.
    Rocha, Carlos A. F.
    Arantes, Dalton S.
    2006 IEEE NINTH INTERNATIONAL SYMPOSIUM ON SPREAD SPECTRUM TECHNIQUES AND APPLICATIONS, PROCEEDINGS, 2006, : 193 - 197
  • [10] AN OVERVIEW OF IMPLANT HARDWARE
    ENGLISH, C
    JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 1990, 121 (03): : 360 - 360