Hardware security: Threat models and metrics

M. Rostami, F. Koushanfar, J. Rajendran, R. Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this paper, we explain the threat models, the state-of-the-art defenses, and the metrics used to evaluate the defenses. The threat models outlined in this paper enables one to understand the attacks. Defenses and metrics can help defenders to build stronger countermeasures and evaluate them against other protection techniques using the metrics.

Original languageEnglish (US)
Title of host publication2013 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2013 - Digest of Technical Papers
Pages819-823
Number of pages5
DOIs
StatePublished - 2013
Event2013 32nd IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2013 - San Jose, CA, United States
Duration: Nov 18 2013Nov 21 2013

Publication series

NameIEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD
ISSN (Print)1092-3152

Other

Other2013 32nd IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2013
Country/TerritoryUnited States
CitySan Jose, CA
Period11/18/1311/21/13

Keywords

  • Camouflaging
  • Counterfeiting
  • Hardware Trojans
  • IP/IC Piracy
  • Reverse Engineering
  • Side-Channel Attacks

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Computer Graphics and Computer-Aided Design

Fingerprint

Dive into the research topics of 'Hardware security: Threat models and metrics'. Together they form a unique fingerprint.

Cite this