作者: Masoud Rostami , Farinaz Koushanfar , Ramesh Karri
DOI: 10.1109/JPROC.2014.2335155
关键词: Computer security 、 Engineering 、 Computer security model 、 Security information and event management 、 Computer security compromised by hardware failure 、 Hardware security module 、 Threat model 、 Security service 、 Hardware obfuscation 、 Supply chain
摘要: The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …