Open Source Hardware Design and Hardware Reverse Engineering: A Security Analysis

被引:0
|
作者
Baehr, Johanna [1 ]
Hepp, Alexander [1 ]
Brunner, Michaela [1 ]
Malenko, Maja [2 ]
Sigl, Georg [1 ,3 ]
机构
[1] Chair of Security in Information Technology, Information and Technology, Technical University of Munich, Tum School of Computation, Germany
[2] Hensoldt Cyber GmbH, Germany
[3] Fraunhofer Institute for Applied and Integrated Security (AISEC), Germany
来源
Proceedings - 2022 25th Euromicro Conference on Digital System Design, DSD 2022 | 2022年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
25th Euromicro Conference on Digital System Design, DSD 2022
中图分类号
学科分类号
摘要
Accident prevention - Computer aided design - Hardware security - Integrated circuit design - Integrated circuits - Malware - Open source software - Open systems - Security systems - Timing circuits
引用
收藏
页码:504 / 512
相关论文
共 35 条
  • [1] On Reverse Engineering-Based Hardware Trojan Detection
    Department of Electrical and Computer Engineering, University of Maryland, College Park
    MD
    20742, United States
    不详
    FL
    32611, United States
    IEEE Trans Comput Aided Des Integr Circuits Syst, 1 (49-57):
  • [2] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [3] OpenEarable ExG: Open-Source Hardware for Ear-Based Biopotential Sensing Applications
    Lepold, Philipp
    Röddiger, Tobias
    King, Tobias
    Kunze, Kai
    Maurer, Christoph
    Beigl, Michael
    arXiv,
  • [4] In-Memory Computing Architecture for Efficient Hardware Security
    Ajmi, Hala
    Zayer, Fakhreddine
    Belgacem, Hamdi
    arXiv,
  • [5] Hardware Security Vulnerability in Analog Signal Chain Filters
    Banahene, Kwabena Oppong
    Strong, Matthew R.
    Gadogbe, Bryce
    Chen, Degang
    Geiger, Randall L.
    Proceedings - IEEE International Symposium on Circuits and Systems, 2022, 2022-May : 667 - 671
  • [6] TIMING ANALYSIS OF COMPUTER HARDWARE
    HITCHCOCK, RB
    SMITH, GL
    CHENG, DD
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1982, 26 (01) : 100 - 105
  • [7] Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    arXiv, 2022,
  • [8] Multi-level attacks: An emerging security concern for cryptographic hardware
    Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, West Bengal-721302, India
    不详
    Proc. Des. Autom. Test Eur. DATE, (1176-1179):
  • [9] AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
    Texas A&M University, United States
    不详
    arXiv,
  • [10] Natural Language Processing Meets Hardware Trojan Detection: Automating Security of FPGAs
    More, Vaishnavi
    Chaudhari, Aaditya
    Puli, Barnaboss
    Vuppala, Vasavi
    Dofe, Jaya
    Danesh, Wafi
    Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI, 2024, : 775 - 778