Overview of security problems and the design of secure electronic system

Authors

  • V.A. Gorbachov
  • K.B. Abdulrahman

DOI:

https://doi.org/10.30837/rt.2017.4.191.10

Abstract

The classification and methods of fighting Hardware Trojans are analyzed. The choice of the technology for the design of protected electronic systems is justified, which ensures their resistance to the destructive effect of internal components.

References

Tehranipoor, M. and Koushanfar, F. A Survey of Hardware Trojan Taxonomy and Detection // IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, Jan. 2010.

Chakraborty, R. S., Narasimhan, S. and Bhunia, S. Hardware Trojan: Threats and emerging solutions // IEEE International High Level Design Validation and Test Workshop. IEEE, Nov. 2009, pp. 166-171.

He Li, Qiang Liu, Jiliang Zhang Survey of hardware Trojan threat and defense // INTEGRATION, the VLSI journal 55, 2016, pp. 426–437.

Julien Francq, Hardware Trojans Detection Methods, Cassidian Cybersecurity // All rights reserved, in TRUDEVICE, 2013, Page 36 – 40.

Gorbachov, V. Malicious Hardware: characteristics, classification and formal models // IEEE East-West Design & Test Symposium (EWDTS2014), Kiev, Ukraine, 2014, pp. 254-257.

Горбачев В.А., Степаненко, В.В. Сертификация периферийных устройств компьютерных систем // Радиотехника. – 2003. – Вып. 134.- С. 206-209.

Samuel, T. King and all Designing and implementing malicious hardware // LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats Article No. 5 San Francisco, California – April 15 – 15, 2008.

Mark Beaumont, Bradley Hopkins and Tristan Newby. Hardware Trojans – Prevention, Detection, Countermeasures (A literature Review). DSTO Defence Science and Technology Organisation Edinburgh, South Australia 5111, Australia 2011].

Bloom, G., Narahari B. & Simha, R. (2009) OS support for detecting trojan circuit attacks, in IEEE International Symposium on Hardware-Oriented Security and Trust.

Abramovici, M. & Bradley, P. (2009) Integrated circuit security: new threats and solutions, in Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW ’09, ACM, New York, NY, USA, pp. 55:1–55:3.

McIntyre, D. R.,Wolff, F. G., Papachristou, C. A. & Bhunia S. (2009) Dynamic evaluation of hardware trust // IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 108–111.

Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan and Marten van Dijk. Advancing the State-of-the-Art // Hardware Trojans Detection, University of Connecticut, 2016.

Tehranipoor, M., Wang, C. Introduction to hardware security and trust. – New York, Springer, 2011.

Banga, M. & Hsiao, M. S. (2009) A novel sustained vector technique for the detection of hardware Trojans // in VLSI Design 2009: Improving Productivity through Higher Abstraction, The 22nd International Conference on VLSI Design, New Delhi, India, 5-9 January 2009, IEEE, pp. 327–332.

Jin, Y. & Makris, Y. (2008) Hardware Trojan detection using path delay fingerprint, in IEEE International Symposium on Hardware-Oriented Security and Trust.

Potkonjak, M. (2010) Synthesis of trustable ics using untrusted cad tools // Proceedings of the 47th Design Automation Conference, pp. 633–634.

Waksman, A. & Sethumadhavan, S. (2011) Silencing hardware backdoors // Proceedings of the 32nd IEEE Symposium on Security and Privacy, May 2011.

Hicks, M., Finnicum, M., King, S. T., Martin, M. M. K. & Smith, J. M. (2010) Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically, Security and Privacy // IEEE Symposium on 0, 159–172.

Silva, M. L. & Ferreira, J. C. (2010) Creation of partial FP configurations at run-time // Proceedings of the 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD ’10, IEEE Computer Society, Washington, DC, USA, pp. 80–87,

Published

2017-12-22

How to Cite

Gorbachov, V., & Abdulrahman, K. (2017). Overview of security problems and the design of secure electronic system. Radiotekhnika, 4(191), 113–119. https://doi.org/10.30837/rt.2017.4.191.10

Issue

Section

Articles