Hardware Devices Security, their Vulnerabilities and Solutions

被引:0
|
作者
Qayyum, Sundus [1 ]
Ashraf, Sajjad [1 ]
Shafique, Muzammal [1 ]
Waheed, Salman [1 ]
机构
[1] CESAT, Islamabad, Pakistan
来源
PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST) | 2018年
关键词
Hardware Trojan; HT Insertion; HT Detection; HT Prevention;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Similar to software viruses, hardware devices (ICs, PCBs, FPGAs etc) can also be exploited by the introduction of malicious logic into circuits. This job can be done by adding any malicious logic inside the circuit or by changing the logic in such a manner that will remain undetectable during the testing and verification process. Therefore, it is necessary for the device user to ensure that device being used is trustable. Any Hardware device, especially integrated circuits (ICs), was initially believed to be secure as compare to software products. This vulnerability in hardware devices becomes one of the most important research topic in recent times. This paper will present the review of current research about vulnerabilities in hardware devices, insertion of hardware trojans, the detection methods that can help the user to identify the presence of any malicious circuitry and the prevention measures that can be used to avoid hardware attacks.
引用
收藏
页码:439 / 445
页数:7
相关论文
共 50 条
  • [21] An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
    Jiang, Xingbin
    Lora, Michele
    Chattopadhyay, Sudipta
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (02)
  • [22] Spying on Kids' Smart Devices: Beware of Security Vulnerabilities!
    Bin Azhar, M. A. Hannan
    Smith, Danny
    Cain, Aimee
    CYBERSECURITY IN THE AGE OF SMART SOCIETIES, 2022, 2023, : 123 - 140
  • [23] A State-of-the-Art Reverse Engineering Approach for Combating Hardware Security Vulnerabilities at the System and PCB Level in IoT Devices
    Sharma, Arvind
    Dyrkolbotn, Geir Olav
    Overlier, Lasse
    Waltoft-Olsen, Andre Jung
    Franke, Katrin
    Katsikas, Sokratis
    2022 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS (PAINE), 2022, : 1 - 7
  • [24] Study of Hardware Trojans Based Security Vulnerabilities in Cyber Physical Systems
    Lingasubramanian, Karthikeyan
    Kumar, Ranveer
    Gunti, Nagendra Babu
    Morris, Thomas
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [25] Processor Hardware Security Vulnerabilities and their Detection by Unique Program Execution Checking
    Fadiheh, Mohammad Rahmani
    Stoffel, Dominik
    Barrett, Clark
    Mitra, Subhasish
    Kunz, Wolfgang
    2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 994 - 999
  • [26] Determining security key the hardware for digital devices
    Zolotorevich, Ludmila A.
    Ilyinkov, Valery A.
    VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2022, (60): : 102 - 110
  • [27] Improving online baneing security with hardware devices
    Puente, F
    Sandoval, JD
    Hernández, P
    Molina, CJ
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 174 - 177
  • [28] Implementation of a Hardware Security Chip for Mobile Devices
    Ju, Hongil
    Kim, Youngsae
    Jeon, Yongsung
    Kim, Jeongnyeo
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2015, 61 (04) : 500 - 506
  • [29] Solutions for RFID Smart Tagged Card Security Vulnerabilities
    Williamson, Avery, Sr.
    Tsay, Li-Shiang
    Kateeb, Ibraheem A.
    Burton, Lany
    2013 AASRI CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL, 2013, 4 : 282 - 287
  • [30] Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
    Anand, Priya
    Ryoo, Jungwoo
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,