Hardware Security: Threat Models and Metrics

被引:0
|
作者
Rostami, M. [1 ]
Koushanfar, F. [1 ]
Rajendran, J. [2 ]
Karri, R. [2 ]
机构
[1] Rice Univ, Houston, TX 77251 USA
[2] Polytech Inst NYU, Brooklyn, NY USA
关键词
Hardware Trojans; Reverse Engineering; IP/IC Piracy; Side-Channel Attacks; Counterfeiting; Camouflaging; PIRACY; LOGIC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.
引用
收藏
页码:819 / 823
页数:5
相关论文
共 50 条
  • [1] A Primer on Hardware Security: Models, Methods, and Metrics
    Rostami, Masoud
    Koushanfar, Farinaz
    Karri, Ramesh
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1283 - 1295
  • [2] Hardware Threat: the Challenge of Information Security
    Li, Qingbao
    Gao, Hongbo
    Xu, Bing
    Jiao, Zhiyong
    [J]. ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 517 - +
  • [3] On metrics and prioritization of investments in hardware security
    Collier, Zachary A.
    Briglia, Brett
    Finkelston, Tom
    Manasco, Mark C.
    Slutzky, David L.
    Lambert, James H.
    [J]. SYSTEMS ENGINEERING, 2023, 26 (04) : 425 - 437
  • [4] Security Metrics and Security Investment Models
    Boehme, Rainer
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 10 - 24
  • [5] Novel security models, metrics and security assessment networks
    Enoch, Simon Yusuf
    Lee, Jang Se
    Kim, Dong Seong
    [J]. COMPUTER NETWORKS, 2021, 189
  • [6] Security metrics for power based SCA resistant hardware implementation
    Park, Jungmin
    Tyagi, Akhilesh
    [J]. 2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 541 - 546
  • [7] Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry
    Monjur, Mohammad
    Calzadillas, Joshua
    Yu, Qiaoyan
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2023, 28 (05)
  • [8] Security Threat Analyses and Attack Models for Approximate Computing Systems: From Hardware and Micro-architecture Perspectives
    Yellu, Pruthvy
    Buell, Landon
    Mark, Miguel
    Kinsy, Michel A.
    Xu, Dongpeng
    Yu, Qiaoyan
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2021, 26 (04)
  • [9] Security metrics models and application with SVM in information security management
    Qu, Wei
    Zhang, De-Zheng
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3234 - +
  • [10] Evaluation of Building-Specific Threat-Based Security Metrics
    Aumpansub, Ponkamon
    DeGraw, Jason
    Bahnfleth, William P.
    [J]. ASHRAE TRANSACTIONS 2014, VOL 120, PT 1, 2014, 120