Open Source Hardware Design and Hardware Reverse Engineering: A Security Analysis

被引:0
|
作者
Baehr, Johanna [1 ]
Hepp, Alexander [1 ]
Brunner, Michaela [1 ]
Malenko, Maja [2 ]
Sigl, Georg [1 ,3 ]
机构
[1] Chair of Security in Information Technology, Information and Technology, Technical University of Munich, Tum School of Computation, Germany
[2] Hensoldt Cyber GmbH, Germany
[3] Fraunhofer Institute for Applied and Integrated Security (AISEC), Germany
来源
Proceedings - 2022 25th Euromicro Conference on Digital System Design, DSD 2022 | 2022年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
25th Euromicro Conference on Digital System Design, DSD 2022
中图分类号
学科分类号
摘要
Accident prevention - Computer aided design - Hardware security - Integrated circuit design - Integrated circuits - Malware - Open source software - Open systems - Security systems - Timing circuits
引用
收藏
页码:504 / 512
相关论文
共 35 条
  • [21] Binary Jamming Message Solutions for Source-Wiretapping Under Physical-Layer Security: Analysis and Design
    University of Ulsan, Ulsan, Korea, Republic of
    Wireless Pers Commun, 4 (2493-2512):
  • [22] An Ensemble-Based Unsupervised Learning Technique for Identifying Hardware Trojan to Enhance Security and Reliability in IoT Devices for Edge Computing
    Priyatharishini, M.
    Devi, Nirmala M.
    SSRN, 2023,
  • [23] Detection Methods of Hardware Trojans Based on DBN and QPSO-OCSVM Anomalous Behavior Analysis
    Beijing Electronic Science and Technology Institute, Beijing
    100070, China
    Int. Conf. Electron. Commun., Netw. Comput. Technol., ECNCT, (250-255): : 250 - 255
  • [24] Analysis of the core team role in open source communities
    Business Administration Department, University of Seville, Seville, Spain
    不详
    Proc. Int. Conf. Complex, Intelligent Softw. Intensive Syst., CISIS, (109-114):
  • [25] Particle Swarm Optimization-Driven DSE-Based Low-Cost Hardware Security for Securing DSP IP Cores
    Rathor, Mahendra
    Sengupta, Anirban
    EAI/Springer Innovations in Communication and Computing, 2022, : 29 - 54
  • [26] Modeling and analysis of all-digital full-hardware quadrature phase-locked loop
    Liu, Yajing
    Fan, Yu
    Diangong Jishu Xuebao/Transactions of China Electrotechnical Society, 2015, 30 (15): : 148 - 155
  • [27] A Dynamic Window Size-Based VLSI Architecture Design of Moving Average Filter and Its Vulnerability to Hardware Trojans
    Chaudhury, Moitreya
    Pandit, Binit Kumar
    Banerjee, Ayan
    2024 28th International Symposium on VLSI Design and Test, VDAT 2024, 2024,
  • [28] Solutions for reverse engineering 4GL applications, recovering the design of a logistical wholesale system
    Nagy, Csaba
    Vidács, László
    Ferenc, Rudolf
    Gyimóthy, Tibor
    Kocsis, Ferenc
    Kovács, István
    Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, 2011, : 343 - 346
  • [29] Citation analysis of Engineering Design reports for information literacy assessment
    Library and Information Science, Drexel University, United States
    不详
    不详
    不详
    ASEE Annu. Conf. Expos. Conf. Proc., 2010,
  • [30] Implementation and performance analysis of advanced IT services based on open source JAIN SLEE
    Femminella, M.
    Francescangeli, R.
    Maccherani, E.
    Monacelli, L.
    Proceedings - Conference on Local Computer Networks, LCN, 2011, : 746 - 753