Overview of security problems and the design of secure electronic system
DOI:
https://doi.org/10.30837/rt.2017.4.191.10Abstract
The classification and methods of fighting Hardware Trojans are analyzed. The choice of the technology for the design of protected electronic systems is justified, which ensures their resistance to the destructive effect of internal components.References
Tehranipoor, M. and Koushanfar, F. A Survey of Hardware Trojan Taxonomy and Detection // IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, Jan. 2010.
Chakraborty, R. S., Narasimhan, S. and Bhunia, S. Hardware Trojan: Threats and emerging solutions // IEEE International High Level Design Validation and Test Workshop. IEEE, Nov. 2009, pp. 166-171.
He Li, Qiang Liu, Jiliang Zhang Survey of hardware Trojan threat and defense // INTEGRATION, the VLSI journal 55, 2016, pp. 426–437.
Julien Francq, Hardware Trojans Detection Methods, Cassidian Cybersecurity // All rights reserved, in TRUDEVICE, 2013, Page 36 – 40.
Gorbachov, V. Malicious Hardware: characteristics, classification and formal models // IEEE East-West Design & Test Symposium (EWDTS2014), Kiev, Ukraine, 2014, pp. 254-257.
Горбачев В.А., Степаненко, В.В. Сертификация периферийных устройств компьютерных систем // Радиотехника. – 2003. – Вып. 134.- С. 206-209.
Samuel, T. King and all Designing and implementing malicious hardware // LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats Article No. 5 San Francisco, California – April 15 – 15, 2008.
Mark Beaumont, Bradley Hopkins and Tristan Newby. Hardware Trojans – Prevention, Detection, Countermeasures (A literature Review). DSTO Defence Science and Technology Organisation Edinburgh, South Australia 5111, Australia 2011].
Bloom, G., Narahari B. & Simha, R. (2009) OS support for detecting trojan circuit attacks, in IEEE International Symposium on Hardware-Oriented Security and Trust.
Abramovici, M. & Bradley, P. (2009) Integrated circuit security: new threats and solutions, in Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW ’09, ACM, New York, NY, USA, pp. 55:1–55:3.
McIntyre, D. R.,Wolff, F. G., Papachristou, C. A. & Bhunia S. (2009) Dynamic evaluation of hardware trust // IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 108–111.
Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan and Marten van Dijk. Advancing the State-of-the-Art // Hardware Trojans Detection, University of Connecticut, 2016.
Tehranipoor, M., Wang, C. Introduction to hardware security and trust. – New York, Springer, 2011.
Banga, M. & Hsiao, M. S. (2009) A novel sustained vector technique for the detection of hardware Trojans // in VLSI Design 2009: Improving Productivity through Higher Abstraction, The 22nd International Conference on VLSI Design, New Delhi, India, 5-9 January 2009, IEEE, pp. 327–332.
Jin, Y. & Makris, Y. (2008) Hardware Trojan detection using path delay fingerprint, in IEEE International Symposium on Hardware-Oriented Security and Trust.
Potkonjak, M. (2010) Synthesis of trustable ics using untrusted cad tools // Proceedings of the 47th Design Automation Conference, pp. 633–634.
Waksman, A. & Sethumadhavan, S. (2011) Silencing hardware backdoors // Proceedings of the 32nd IEEE Symposium on Security and Privacy, May 2011.
Hicks, M., Finnicum, M., King, S. T., Martin, M. M. K. & Smith, J. M. (2010) Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically, Security and Privacy // IEEE Symposium on 0, 159–172.
Silva, M. L. & Ferreira, J. C. (2010) Creation of partial FP configurations at run-time // Proceedings of the 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD ’10, IEEE Computer Society, Washington, DC, USA, pp. 80–87,
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).