Mostra el registre d'ítem simple
Trojans in Early Design Steps—An Emerging Threat
dc.contributor.author | Polian, Ilia |
dc.contributor.author | Becker, Georg T. |
dc.contributor.author | Regazzoni, Francesco |
dc.coverage.spatial | east=2.11563799999999; north=41.38479239999999; name=Zona Universitària-Escola T S d'Enginyers, 08028 Barcelona, Espanya |
dc.date.accessioned | 2017-01-17T10:07:17Z |
dc.date.available | 2017-01-17T10:07:17Z |
dc.date.issued | 2016-11-16 |
dc.identifier.uri | http://hdl.handle.net/2117/99414 |
dc.description.abstract | Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design process. We show that third-party intellectual property cores and CAD tools constitute realistic attack surfaces and that even system specification can be targeted by adversaries. We discuss the devastating damage potential of such attacks, the applicable countermeasures against them and their deficiencies. |
dc.format.extent | 6 p. |
dc.language.iso | eng |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Enginyeria electrònica |
dc.subject.lcsh | Embedded computer systems--Congresses |
dc.subject.lcsh | Integrated circuits |
dc.subject.lcsh | Computer networks--Security measures |
dc.title | Trojans in Early Design Steps—An Emerging Threat |
dc.type | Conference report |
dc.subject.lemac | Sistemes integrats -- Congressos |
dc.subject.lemac | Circuits integrats |
dc.subject.lemac | Seguretat informàtica -- Congressos |
dc.rights.access | Open Access |