Hardware Devices Security, their Vulnerabilities and Solutions

被引:0
|
作者
Qayyum, Sundus [1 ]
Ashraf, Sajjad [1 ]
Shafique, Muzammal [1 ]
Waheed, Salman [1 ]
机构
[1] CESAT, Islamabad, Pakistan
来源
PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST) | 2018年
关键词
Hardware Trojan; HT Insertion; HT Detection; HT Prevention;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Similar to software viruses, hardware devices (ICs, PCBs, FPGAs etc) can also be exploited by the introduction of malicious logic into circuits. This job can be done by adding any malicious logic inside the circuit or by changing the logic in such a manner that will remain undetectable during the testing and verification process. Therefore, it is necessary for the device user to ensure that device being used is trustable. Any Hardware device, especially integrated circuits (ICs), was initially believed to be secure as compare to software products. This vulnerability in hardware devices becomes one of the most important research topic in recent times. This paper will present the review of current research about vulnerabilities in hardware devices, insertion of hardware trojans, the detection methods that can help the user to identify the presence of any malicious circuitry and the prevention measures that can be used to avoid hardware attacks.
引用
收藏
页码:439 / 445
页数:7
相关论文
共 50 条
  • [1] Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions
    Karimi, Naghmeh
    Basu, Kanad
    Chang, Chip-Hong
    Fung, Jason M.
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 223 - 227
  • [2] Hardware Vulnerabilities and Their Effects on CE Devices: Design for Security Against Trojans
    Sengupta, Anirban
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2017, 6 (03) : 126 - 133
  • [3] Probabilistic Evaluation of Hardware Security Vulnerabilities
    Gong, Yanping
    Qian, Fengyu
    Wang, Lei
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2019, 24 (02)
  • [4] A Study on the Hardware-based Security Solutions for Smart Devices
    Ju, Hongil
    Jeon, Yongsung
    Kim, Jeongnyeo
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 833 - 834
  • [5] Security Vulnerabilities on Implantable Medical Devices
    Longras, Ana
    Oliveira, Henrique
    Paiva, Sara
    2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [6] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
  • [7] Hardware Security of CE Devices
    Sengupta, Anirban
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2017, 6 (01) : 130 - 133
  • [8] Silicon Based Security for Protection Against Hardware Vulnerabilities
    Shaminder Kaur
    Balwinder Singh
    Harsimranjit Kaur
    Silicon, 2022, 14 : 2421 - 2427
  • [9] AN IN-DEPTH VISION TO HARDWARE DESIGN SECURITY VULNERABILITIES
    Younis, Zainab
    Mahmood, Basim
    JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2022, 8 (01): : 33 - 44
  • [10] Silicon Based Security for Protection Against Hardware Vulnerabilities
    Kaur, Shaminder
    Singh, Balwinder
    Kaur, Harsimranjit
    SILICON, 2022, 14 (05) : 2421 - 2427