Countermeasures Against Hardware Trojans

作者: Anatoly Belous , Vitali Saladukha

DOI: 10.1007/978-3-030-47218-4_7

关键词: Computer hardwareSection (archaeology)Identification (information)Computer science

摘要: This section is essentially a systematized review of the results studies dedicated to methods counteracting hardware Trojans in microcircuits. It should be said from very beginning that there are no such countermeasures would ensure absolute protection threats. As noted above, allow 100% identification defects manufactured

参考文章(107)
Y Deswarte, B Randell, G Trouessin, JC Fabre, Improvement of Data Processing Security by Means of Fault Tolerance Computing Laboratory Technical Report Series. ,(1991)
Georg T Becker, Francesco Regazzoni, Christof Paar, Wayne P Burleson, None, Stealthy Dopant-Level Hardware Trojans Cryptographic Hardware and Embedded Systems - CHES 2013. pp. 197- 214 ,(2013) , 10.1007/978-3-642-40349-1_12
Farinaz Koushanfar, Hardware Metering: A Survey Introduction to Hardware Security and Trust. pp. 103- 122 ,(2012) , 10.1007/978-1-4419-8080-9_5
Ulrich Rührmair, Srinivas Devadas, Farinaz Koushanfar, Security Based on Physical Unclonability and Disorder Introduction to Hardware Security and Trust. pp. 65- 102 ,(2012) , 10.1007/978-1-4419-8080-9_4
Ziv Glazberg, Mark Moulin, Avigail Orni, Sitvanit Ruah, Emmanuel Zarpas, PSL: Beyond Hardware Verification Springer, Dordrecht. pp. 245- 260 ,(2007) , 10.1007/978-1-4020-6254-4_19
Kenneth K. Yiu, Mark S. Anderson, Christopher J. North, Towards Countering the Rise of the Silicon Trojan ,(2008)
Ronald L. Rivest, The RC5 encryption algorithm fast software encryption. pp. 86- 96 ,(1994) , 10.1007/3-540-60590-8_7
K. Lofstrom, W.R. Daasch, D. Taylor, IC identification circuit using device mismatch international solid-state circuits conference. pp. 372- 373 ,(2000) , 10.1109/ISSCC.2000.839821
Anthony Cozzie, Chris Grier, Yuanyuan Zhou, Joseph Tucek, Samuel T. King, Weihang Jiang, Designing and implementing malicious hardware LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. pp. 5- ,(2008)
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider, Garbled circuits for leakage-resilience: hardware implementation and evaluation of one-time programs cryptographic hardware and embedded systems. pp. 383- 397 ,(2010) , 10.1007/978-3-642-15031-9_26