Difference between revisions of "Shahrjerdi2014"
From ACES
(Import from BibTeX) |
m (Import from BibTeX) |
||
Line 3: | Line 3: | ||
|url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7001348 | |url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7001348 | ||
|abstract=<p>An integrated circuit (IC) Supply Chain Hardware Integrity for Electronics Defense (SHIELD) is envisioned to enable advanced supply chain hardware authentication and tracing capabilities. The suggested SHIELD is expected to be a ultralower power, minuscule electronic component that is physically attached to the host IC. This paper focuses on two important adversarial acts on SHIELD: physical reverse engineering and physical side-channel analysis. These attacks can be launched through mechanical or optical means and they can reveal and/or modify the confidential on-chip data or enable reverse-engineering of the design. For detection of these attacks and subsequent erasing of the sensitive data, sensors, erasure devices, and the relevant control circuitry need to be added to the SHIELD. We describe the device-level operation of the optical (photodetectors) and mechanical (nano- or micro-electromechanical switches) sensors and how they can be integrated within an IC to detect physical attacks. The operation of these micro/nano-scale sensors is unreliable due to environmental, operational, and structural fluctuations and noise. We outline system-level approaches to design a reliable countermeasure against physical attacks using unreliable sensors.</p> | |abstract=<p>An integrated circuit (IC) Supply Chain Hardware Integrity for Electronics Defense (SHIELD) is envisioned to enable advanced supply chain hardware authentication and tracing capabilities. The suggested SHIELD is expected to be a ultralower power, minuscule electronic component that is physically attached to the host IC. This paper focuses on two important adversarial acts on SHIELD: physical reverse engineering and physical side-channel analysis. These attacks can be launched through mechanical or optical means and they can reveal and/or modify the confidential on-chip data or enable reverse-engineering of the design. For detection of these attacks and subsequent erasing of the sensitive data, sensors, erasure devices, and the relevant control circuitry need to be added to the SHIELD. We describe the device-level operation of the optical (photodetectors) and mechanical (nano- or micro-electromechanical switches) sensors and how they can be integrated within an IC to detect physical attacks. The operation of these micro/nano-scale sensors is unreliable due to environmental, operational, and structural fluctuations and noise. We outline system-level approaches to design a reliable countermeasure against physical attacks using unreliable sensors.</p> | ||
|month=11 | |||
|year=2014 | |||
|booktitle=International Conference on Computer-Aided Design | |booktitle=International Conference on Computer-Aided Design | ||
|title=Shielding and Securing Integrated Circuits with Sensors | |title=Shielding and Securing Integrated Circuits with Sensors | ||
|entry=inproceedings | |entry=inproceedings | ||
}} | }} |
Revision as of 03:42, 4 September 2021
Shahrjerdi2014 | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Davood Shahrjerdi and Jeyavijayan Rajendran and Siddharth Garg and Farinaz Koushanfar and Ramesh Karri |
booktitle | International Conference on Computer-Aided Design |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 11 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | Shielding and Securing Integrated Circuits with Sensors |
type | |
volume | |
year | 2014 |
doi | |
issn | |
isbn | |
url | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7001348 |