4.7 Article

A Primer on Hardware Security: Models, Methods, and Metrics

Journal

PROCEEDINGS OF THE IEEE
Volume 102, Issue 8, Pages 1283-1295

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JPROC.2014.2335155

Keywords

Counterfeiting; hardware Trojans; IP piracy; reverse engineering; side-channel attacks

Funding

  1. U.S. Office of Naval Research (ONR) [R17460]
  2. National Science Foundation (NSF) [CNS-1059416, CNS-1059328, CCF-1319841]
  3. NYU/NYU-AD Center for Research in Information Security Studies and Privacy (CRISSP)
  4. ARO [W911NF-13-1-0272]
  5. Direct For Computer & Info Scie & Enginr
  6. Division Of Computer and Network Systems [1059416] Funding Source: National Science Foundation
  7. Division Of Computer and Network Systems
  8. Direct For Computer & Info Scie & Enginr [0958405] Funding Source: National Science Foundation

Ask authors/readers for more resources

The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available