A primer on hardware security: Models, methods, and metrics

Masoud Rostami, Farinaz Koushanfar, Ramesh Karri

Research output: Contribution to journalArticle

Abstract

The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.

Original languageEnglish (US)
Article number6860363
Pages (from-to)1283-1295
Number of pages13
JournalProceedings of the IEEE
Volume102
Issue number8
DOIs
StatePublished - 2014

Fingerprint

Hardware
Supply chains
Integrated circuits
Hardware security

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

A primer on hardware security : Models, methods, and metrics. / Rostami, Masoud; Koushanfar, Farinaz; Karri, Ramesh.

In: Proceedings of the IEEE, Vol. 102, No. 8, 6860363, 2014, p. 1283-1295.

Research output: Contribution to journalArticle

Rostami, Masoud ; Koushanfar, Farinaz ; Karri, Ramesh. / A primer on hardware security : Models, methods, and metrics. In: Proceedings of the IEEE. 2014 ; Vol. 102, No. 8. pp. 1283-1295.
@article{818d6e024d8b40e28109a1e18f844b1a,
title = "A primer on hardware security: Models, methods, and metrics",
abstract = "The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.",
author = "Masoud Rostami and Farinaz Koushanfar and Ramesh Karri",
year = "2014",
doi = "10.1109/JPROC.2014.2335155",
language = "English (US)",
volume = "102",
pages = "1283--1295",
journal = "Proceedings of the IEEE",
issn = "0018-9219",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "8",

}

TY - JOUR

T1 - A primer on hardware security

T2 - Models, methods, and metrics

AU - Rostami, Masoud

AU - Koushanfar, Farinaz

AU - Karri, Ramesh

PY - 2014

Y1 - 2014

N2 - The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.

AB - The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.

UR - http://www.scopus.com/inward/record.url?scp=84905002818&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84905002818&partnerID=8YFLogxK

U2 - 10.1109/JPROC.2014.2335155

DO - 10.1109/JPROC.2014.2335155

M3 - Article

AN - SCOPUS:84905002818

VL - 102

SP - 1283

EP - 1295

JO - Proceedings of the IEEE

JF - Proceedings of the IEEE

SN - 0018-9219

IS - 8

M1 - 6860363

ER -