Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4821
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:38Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:38Z-
dc.date.issued2021-
dc.identifier.citationHu, W., Chang, C. -., Sengupta, A., Bhunia, S., Kastner, R., & Li, H. (2021). An overview of hardware security and trust: Threats, countermeasures, and design tools. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 40(6), 1010-1038. doi:10.1109/TCAD.2020.3047976en_US
dc.identifier.issn0278-0070-
dc.identifier.otherEID(2-s2.0-85099090581)-
dc.identifier.urihttps://doi.org/10.1109/TCAD.2020.3047976-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4821-
dc.description.abstractHardware security and trust have become a pressing issue during the last two decades due to the globalization of the semiconductor supply chain and ubiquitous network connection of computing devices. Computing hardware is now an attractive attack surface for launching powerful cross-layer security attacks, allowing attackers to infer secret information, hijack control flow, compromise system root-of-trust, steal intellectual property (IP), and fool machine learners. On the other hand, security practitioners have been making tremendous efforts in developing protection techniques and design tools to detect hardware vulnerabilities and fortify hardware design against various known hardware attacks. This article presents an overview of hardware security and trust from the perspectives of threats, countermeasures, and design tools. By introducing the most recent advances in hardware security research and developments, we aim to motivate hardware designers and electronic design automation tool developers to consider the new challenges and opportunities of incorporating an additional dimension of security into robust hardware design, testing, and verification. © 1982-2012 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systemsen_US
dc.subjectComputer aided designen_US
dc.subjectSupply chainsen_US
dc.subjectUbiquitous computingen_US
dc.subjectComputing hardwareen_US
dc.subjectCross-layer securitiesen_US
dc.subjectElectronic design automation toolsen_US
dc.subjectHardware designersen_US
dc.subjectProtection techniquesen_US
dc.subjectSecurity and trustsen_US
dc.subjectSecurity practitionersen_US
dc.subjectUbiquitous networksen_US
dc.subjectHardware securityen_US
dc.titleAn Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Toolsen_US
dc.typeReviewen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: