TY - JOUR
T1 - A primer on hardware security
T2 - Models, methods, and metrics
AU - Rostami, Masoud
AU - Koushanfar, Farinaz
AU - Karri, Ramesh
PY - 2014/8
Y1 - 2014/8
N2 - The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.
AB - The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.
UR - http://www.scopus.com/inward/record.url?scp=84905002818&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84905002818&partnerID=8YFLogxK
U2 - 10.1109/JPROC.2014.2335155
DO - 10.1109/JPROC.2014.2335155
M3 - Article
AN - SCOPUS:84905002818
SN - 0018-9219
VL - 102
SP - 1283
EP - 1295
JO - Proceedings of the IEEE
JF - Proceedings of the IEEE
IS - 8
M1 - 6860363
ER -