Difference between revisions of "Rostami2013hardware"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 4: | Line 4: | ||
|keywords=Camouflaging, Counterfeiting, hardware Trojans, IP/IC Piracy, reverse engineering, SideChannel Attacks | |keywords=Camouflaging, Counterfeiting, hardware Trojans, IP/IC Piracy, reverse engineering, SideChannel Attacks | ||
|abstract=<p><span style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12.8px;">The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.</span></p> | |abstract=<p><span style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12.8px;">The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.</span></p> | ||
|month=11 | |||
|year=2013 | |||
|journal=International Conference on Computer-Aided Deisgn | |journal=International Conference on Computer-Aided Deisgn | ||
|title=Hardware Security: Threat Models and Metrics | |title=Hardware Security: Threat Models and Metrics | ||
|entry=conference | |entry=conference | ||
| | |pdf=Rostami2013hardware.pdf | ||
}} | }} |
Latest revision as of 17:39, 9 November 2021
Rostami2013hardware | |
---|---|
entry | conference |
address | |
annote | |
author | Masoud Rostami and Farinaz Koushanfar and Jeyavijayan Rajendran and Ramesh Karri |
booktitle | |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | International Conference on Computer-Aided Deisgn |
month | 11 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | Hardware Security: Threat Models and Metrics |
type | |
volume | |
year | 2013 |
doi | |
issn | |
isbn | |
url | http://dl.acm.org/citation.cfm?id=2561985 |
Rostami2013hardware.pdf |