Security Challenges and Requirements for Control Systems in the Semiconductor Manufacturing Sector

نویسنده

  • Malek Ben Salem
چکیده

(Extended Abstract) I. INTRODUCTION Moore's Law and the market requirements for higher perfor­ mance chips are driving the production of increasingly smaller transistors, and therefore, are forcing more stringent controls on semiconductor manufacturing processes and equipment, with a very small room for error. The second trend in the semiconductor industry is the adoption of the e-Manufacturing paradigm [1]. With the rise of fully-automated factories and the new technology size requirements for chips, new security challenges arise as the control systems are becoming increasingly more complicated. The need for high manufacturing yields using these systems is driving more Advanced Process Controls (APC). Control systems, already ubiquitous in the industry, are becoming more and more sophisticated. And complexity, as is widely acknowledged, is the enemy of security. The last trend in the industry is the tendency for manu­ facturers to form joint production ventures. The highly cyclic demand for various consumer electronic products is causing cyclical fluctuation in the manufacturing load of semiconduc­ tor factories. The high costs of development and production facilities for different technology node sizes is driving semi­ conductor companies to form join manufacturing partnerships instead of building new factories. Production of parts may be distributed among manufacturing partner facilities if the manufacturing load in one factory is too high, and part delivery deadlines cannot be met. This new manufacturing model is known the Manufacturing Grid. The goal is to utilize all the manufacturing resources that are distributed between different manufacturing partners and factories different chip parts. This paper presents threats to controls systems in the semi­ conductor manufacturing sector that are driven by the above trends in Section II. In Section III, we review recent research work related to the most important threat faced by these control systems. Section IV presents the research priorities and security requirements needed to mitigate these threats. Finally, Section V concludes the paper by summarizing its main points.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

Production Planning and Control Strategies Used as A Gear Train for The Death and Birth of Manufacturing Industries

This study is conducted to developed innovative production planning and control strategies to manufacturing industries so as to improve production performance and competitiveness of basic metal sectors Though the study was conducted through field observation and questioner used as primary data and literature review on research articles, books, and electronic-sources which used as secondar...

متن کامل

A method of identifying suitable manufacturing system (Cellular) for automotive sector using Analytical Hierarchy Process

Manufacturing produces real wealth for any country and constitutes the back bone for the service sector. The objective of any organization is to earn profit. Usually the market fixes the selling price of the manufactured components. Unless there is focus on the manufacturing strategy of reducing manufacturing cost, it is very difficult to sustain in this ever competitive world. A suitable manuf...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012