DocumentCode :
2110384
Title :
Secured Hardware Design - An Overview
Author :
Burugapalli, Sasikiran ; Al-Assadi, Waleed K.
Author_Institution :
Dept. of Electr. & Comput. Eng., Missouri Univ. of Sci. & Technol., Rolla, MO
fYear :
2008
fDate :
17-20 April 2008
Firstpage :
1
Lastpage :
4
Abstract :
Security is a prime concern in the design of a wide variety of embedded systems and security processors. So the customer security devices such as smart cards and security processors are prone to attack and there are on going research to protect these devices from attackers who intend to extract key information from these devices. Also an active attacker can induce errors during computation and exploit the faulty result to extract the key information embedded in the processor. Due to the design time issues weakness in the design is often revealed in the manufactured chips. Also because the post- manufacture security evaluation is time consuming and expensive, these security issues have to be considered at the design phase. This paper outlines some of the hardware attacks and provides a general idea of the process of these attacks.
Keywords :
application specific integrated circuits; embedded systems; logic design; security of data; customer security devices; embedded systems; manufactured chips; secured hardware design; security processors; Application specific integrated circuits; Data mining; Data security; Hardware; Information security; Logic circuits; Logic design; Logic testing; Supply chains; Timing; Electromagnetic Attack; Hardware Attack; Optical Probing; Soft Errors; Thermal Attack; Timing Attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Region 5 Conference, 2008 IEEE
Conference_Location :
Kansas City, MO
Print_ISBN :
978-1-4244-2076-6
Electronic_ISBN :
978-1-4244-2077-3
Type :
conf
DOI :
10.1109/TPSD.2008.4562750
Filename :
4562750
Link To Document :
بازگشت