Research and Development Priorities for Security of Embedded Hardware Devices
Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include counterfeit parts, cyber-attacks, Trojan attacks, reliance on offshore-manufactured and controlled hardware, software, and rapid increase of...
Saved in:
Published in | IEEE transactions on engineering management Vol. 71; pp. 2800 - 2811 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 0018-9391 1558-0040 |
DOI | 10.1109/TEM.2022.3197240 |
Cover
Loading…
Summary: | Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include counterfeit parts, cyber-attacks, Trojan attacks, reliance on offshore-manufactured and controlled hardware, software, and rapid increase of network technologies. Addressing these threats is vital to maintain and enhance system trust and security. This article develops a framework to address initiatives and success criteria which accounts for different perspectives of system stakeholders and identify different potential emergent conditions and scenarios which are most and least impactful to the trust and security of the supply chain. The article demonstrates a research and development priorities preferences method that accounts for evolving perspectives of supply chain stakeholders and describing the example application of embedded hardware devices as a system. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 0018-9391 1558-0040 |
DOI: | 10.1109/TEM.2022.3197240 |