Hacking and Protecting IC Hardware

Abstract : Traditionally most of people treat a hardware solution as an inherently trusted box. “it is hardware not software; so it is secure and trustworthy”, they say. Recent research shows the need to re-asses this trust in hardware and even in its supply chain. For example, attacks are performed on ICs to retrieve secret information such as cryptographic keys. Moreover, backdoors can be inserted into electronic designs and allow for silent intruders into the system. And, even protecting intellectual-property is becoming a serious concern in the modern globalized, horizontal semiconductor business model. This paper discusses hardware security, both from hacking and protecting aspects. A classification of all possible hardware attacks is provided and most popular attacks are discussed including the countermeasures.
Type de document :
Communication dans un congrès
DATE: Design, Automation and Test in Europe, Mar 2014, Dresden, Germany. 978-3-9815370-2-4/DATE14, pp.1-7, 2014, Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014. 〈10.7873/DATE.2014.112〉
Liste complète des métadonnées

https://hal-lirmm.ccsd.cnrs.fr/lirmm-01234147
Contributeur : Giorgio Di Natale <>
Soumis le : jeudi 26 novembre 2015 - 11:59:44
Dernière modification le : jeudi 11 janvier 2018 - 02:08:13

Identifiants

Citation

Said Hamdioui, Giorgio Di Natale, Battum Van, Jean-Luc Danger, Fethulah Smailbegovic, et al.. Hacking and Protecting IC Hardware. DATE: Design, Automation and Test in Europe, Mar 2014, Dresden, Germany. 978-3-9815370-2-4/DATE14, pp.1-7, 2014, Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014. 〈10.7873/DATE.2014.112〉. 〈lirmm-01234147〉

Partager

Métriques

Consultations de la notice

65