Difference between revisions of "Rostami2013hardware"

From ACES

(Import from BibTeX)
 
m (Import from BibTeX)
Line 4: Line 4:
|keywords=Camouflaging, Counterfeiting, hardware Trojans, IP/IC Piracy, reverse engineering, SideChannel Attacks
|keywords=Camouflaging, Counterfeiting, hardware Trojans, IP/IC Piracy, reverse engineering, SideChannel Attacks
|abstract=<p><span style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12.8px;">The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.</span></p>
|abstract=<p><span style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12.8px;">The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.</span></p>
|month=11
|year=2013
|journal=International Conference on Computer-Aided Deisgn
|journal=International Conference on Computer-Aided Deisgn
|title=Hardware Security: Threat Models and Metrics
|title=Hardware Security: Threat Models and Metrics
|entry=conference
|entry=conference
|date=2013-No-01
}}
}}

Revision as of 03:41, 4 September 2021

Rostami2013hardware
entryconference
address
annote
authorMasoud Rostami and Farinaz Koushanfar and Jeyavijayan Rajendran and Ramesh Karri
booktitle
chapter
edition
editor
howpublished
institution
journalInternational Conference on Computer-Aided Deisgn
month11
note
number
organization
pages
publisher
school
series
titleHardware Security: Threat Models and Metrics
type
volume
year2013
doi
issn
isbn
urlhttp://dl.acm.org/citation.cfm?id=2561985
pdf


Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093