Difference between revisions of "Rostami2014a"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 5: | Line 5: | ||
|keywords=Counterfeiting, hardware Trojans, IP piracy, reverse engineering, side-channel attacks | |keywords=Counterfeiting, hardware Trojans, IP piracy, reverse engineering, side-channel attacks | ||
|abstract=<p>The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.</p> | |abstract=<p>The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.</p> | ||
|month=8 | |||
|year=2014 | |||
|volume=102 | |volume=102 | ||
|journal=Proceedings of the IEEE | |journal=Proceedings of the IEEE | ||
|title=A Primer on Hardware Security: Models, Methods, and Metrics | |title=A Primer on Hardware Security: Models, Methods, and Metrics | ||
|entry=article | |entry=article | ||
| | |pdf=Rostami2014a.pdf | ||
}} | }} |
Latest revision as of 17:39, 9 November 2021
Rostami2014a | |
---|---|
entry | article |
address | |
annote | |
author | Masoud Rostami and Farinaz Koushanfar and Ramesh Karri |
booktitle | |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | Proceedings of the IEEE |
month | 8 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | A Primer on Hardware Security: Models, Methods, and Metrics |
type | |
volume | 102 |
year | 2014 |
doi | 10.1109/JPROC.2014.2335155 |
issn | |
isbn | |
url | http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6860363 |
Rostami2014a.pdf |