Trusted Integrated Circuits: The Problem and Challenges

Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software...

Full description

Saved in:
Bibliographic Details
Published inJournal of computer science and technology Vol. 29; no. 5; pp. 918 - 928
Main Author 吕勇强 周强 蔡懿慈 屈钢
Format Journal Article
LanguageEnglish
Published Boston Springer US 01.09.2014
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1000-9000
1860-4749
DOI10.1007/s11390-014-1479-9

Cover

More Information
Summary:Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software security, hardware security has some special features and challenges. In order to guarantee hardware security, academia has proposed the concept of trusted integrated circuits,which aims at a secure circulation of IC design, manufacture and chip using. This paper reviews the main problems of trusted integrated circuits, and concludes four key domains of the trusted IC, namely the trusted IC design, trusted manufacture,trusted IP protection, and trusted chip authentication. The main challenges in those domains are also analyzed based on the current known techniques. Finally, the main limitations of the current techniques and possible future trends are discussed.
Bibliography:hardware security; trusted integrated circuit; hardware Trojan; IC authentication; IP protection
11-2296/TP
Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software security, hardware security has some special features and challenges. In order to guarantee hardware security, academia has proposed the concept of trusted integrated circuits,which aims at a secure circulation of IC design, manufacture and chip using. This paper reviews the main problems of trusted integrated circuits, and concludes four key domains of the trusted IC, namely the trusted IC design, trusted manufacture,trusted IP protection, and trusted chip authentication. The main challenges in those domains are also analyzed based on the current known techniques. Finally, the main limitations of the current techniques and possible future trends are discussed.
Yong-Qiang Lv,Qiang Zhou,Yi-Ci Cai,Gang Qu(1 Tsinghua National Laboratory for Information Science and Technology, Research Institute of Information Technology Tsinghua University, Beijing 100084, China ;2Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China ;3Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742, U.S.A.)
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:1000-9000
1860-4749
DOI:10.1007/s11390-014-1479-9