作者
Masoud Rostami, Farinaz Koushanfar, Jeyavijayan Rajendran, Ramesh Karri
发表日期
2013/11/18
研讨会论文
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
页码范围
819-823
出版商
IEEE
简介
The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.
引用总数
2014201520162017201820192020202120222023202410122320211722231885
学术搜索中的文章
M Rostami, F Koushanfar, J Rajendran, R Karri - 2013 IEEE/ACM International Conference on Computer …, 2013