Producing Trustworthy Hardware Using Untrusted Components, Personnel and Resources

نویسنده

  • Adam Waksman
چکیده

Producing Trustworthy Hardware Using Untrusted Components, Personnel and Resources

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

Guest Editors’ Introduction: Trusted System-on-Chip with Untrusted Components

h SECURITY OF ELECTRONIC hardware at different stages of its life cycle has emerged as a paramount concern to integrated circuits (ICs) designers, system integrators, as well as to the end users. Over time, hardware components, platforms and supply chains have been considered secure and trustworthy. However, recent discoveries and reports on security vulnerabilities with attacks in microchips a...

متن کامل

Towards resource consumption accounting and control in Java: a practical experience

All software components are not equivalent as far as resource access and consumption are concerned. Some components can do very well with sparse or even missing resources, while others require guaranteed access to the resources they need. In order to deal with non-functional requirements pertaining to resource utilisation we propose a contractual approach of resource management and access contr...

متن کامل

A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)

The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth. It is not economic and feasible because, depending on the application, WSN nodes are high-volume in number (hence, l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014