Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/147019
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hu, Wei | en_US |
dc.contributor.author | Chang, Chip-Hong | en_US |
dc.contributor.author | Sengupta, Anirban | en_US |
dc.contributor.author | Bhunia, Swarup | en_US |
dc.contributor.author | Kastner, Ryan | en_US |
dc.contributor.author | Li, Hai | en_US |
dc.date.accessioned | 2021-05-11T03:59:59Z | - |
dc.date.available | 2021-05-11T03:59:59Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Hu, W., Chang, C., Sengupta, A., Bhunia, S., Kastner, R. & Li, H. (2020). An overview of hardware security and trust : threats, countermeasures and design tools. IEEE Transactions On Computer-Aided Design of Integrated Circuits and Systems. https://dx.doi.org/10.1109/TCAD.2020.3047976 | en_US |
dc.identifier.issn | 1937-4151 | en_US |
dc.identifier.uri | https://hdl.handle.net/10356/147019 | - |
dc.description.abstract | Hardware security and trust have become a pressing issue during the last two decades due to the globalization of the semi-conductor supply chain and ubiquitous network connection of computing devices. Computing hardware is now an attractive attack surface for launching powerful cross-layer security attacks, allowing attackers to infer secret information, hijack control flow, compromise system root-of-trust, steal intellectual property (IP) and fool machine learners. On the other hand, security practitioners have been making tremendous efforts in developing protection techniques and design tools to detect hardware vulnerabilities and fortify hardware design against various known hardware attacks. This paper presents an overview of hardware security and trust from the perspectives of threats, countermeasures and design tools. By introducing the most recent advances in hardware security research and developments, we aim to motivate hardware designers and electronic design automation tool developers to consider the new challenges and opportunities of incorporating an additional dimension of security into robust hardware design, testing and verification. | en_US |
dc.description.sponsorship | National Research Foundation (NRF) | en_US |
dc.language.iso | en | en_US |
dc.relation | CHFA-GC1-AW01, 62074131 | en_US |
dc.relation.ispartof | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | en_US |
dc.rights | © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TCAD.2020.3047976 | en_US |
dc.subject | Engineering::Electrical and electronic engineering::Integrated circuits | en_US |
dc.subject | Engineering::Electrical and electronic engineering::Computer hardware, software and systems | en_US |
dc.title | An overview of hardware security and trust : threats, countermeasures and design tools | en_US |
dc.type | Journal Article | en |
dc.contributor.school | School of Electrical and Electronic Engineering | en_US |
dc.identifier.doi | 10.1109/TCAD.2020.3047976 | - |
dc.description.version | Accepted version | en_US |
dc.identifier.scopus | 2-s2.0-85099090581 | - |
dc.subject.keywords | Security | en_US |
dc.subject.keywords | Hardware | en_US |
dc.description.acknowledgement | This research is supported in part by the National Research Foundation, Singapore, under its National Cybersecurity R&D Programme/Cyber-Hardware Forensic & Assurance Evaluation R&D Programme (NCR Award CHFA-GC1-AW01) and the National Natural Science Foundation of China under grant 62074131. | en_US |
item.grantfulltext | open | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | EEE Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
TCAD_Hardware_Security_Survey.pdf | 5.69 MB | Adobe PDF | ![]() View/Open |
SCOPUSTM
Citations
20
26
Updated on Mar 24, 2023
Web of ScienceTM
Citations
20
16
Updated on Mar 19, 2023
Page view(s)
167
Updated on Mar 25, 2023
Download(s) 20
249
Updated on Mar 25, 2023
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.