Hacking and protecting IC hardware - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

Hacking and protecting IC hardware

(1) , (2, 3) , (4) , , (5) ,
1
2
3
4
5

Résumé

Traditionally most of people treat a hardware solution as an inherently trusted box. “it is hardware not software; so it is secure and trustworthy”, they say. Recent research shows the need to re-asses this trust in hardware and even in its supply chain. For example, attacks are performed on ICs to retrieve secret information such as cryptographic keys. Moreover, backdoors can be inserted into electronic designs and allow for silent intruders into the system. And, even protecting intellectual-property is becoming a serious concern in the modern globalized, horizontal semiconductor business model. This paper discusses hardware security, both from hacking and protecting aspects. A classification of all possible hardware attacks is provided and most popular attacks are discussed including the countermeasures.
Fichier principal
Vignette du fichier
06800313_hacking.pdf (846 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-02412114 , version 1 (07-02-2022)

Identifiants

Citer

Saïd Hamdiaoui, Jean-Luc Danger, Giorgio Di Natale, Fethulah Smailbegovic, Gerard van Battum, et al.. Hacking and protecting IC hardware. DATE 2014 - 17th Design, Automation and Test in Europe Conference and Exhibition, Mar 2014, Dresden, Germany. ⟨10.7873/DATE.2014.112⟩. ⟨hal-02412114⟩
64 Consultations
35 Téléchargements

Altmetric

Partager

Gmail Facebook Twitter LinkedIn More