Abstract
Security researchers have identified a technique for installing a backdoor on computer chips, a security flaw that could profoundly change the computing industry.
- Yang, K., Hicks, M., Dong, Q., Austin, T., and Sylvester, D. A2: Analog Malicious Hardware. 2016 IEEE Symposium on Security and Privacy. July 2016. http://static1.1.sqspcdn.com/static/f/543048/26931843/1464016046717/A2_SP_2016.pdf?token=QXoVmAnDwRuiL84oo13X0iH6cXI%3DGoogle ScholarCross Ref
- Wahby, R.S., Howald, M., Garg, S., Shelat, A., and Walfish, M. Verifiable ASICs, IEEE Security & Privacy 2016, https://eprint.iacr.org/2015/1243.pdfGoogle Scholar
- Sugawara, T., Suzuki, D., Fujii, R., Tawa, S., Hori, R., Shiozaki, M., and Fujino, T. Reversing Stealthy Dopant-Level Circuits, International Conference on Cryptographic Hardware and Embedded Systems, ser. CHES. New York, NY: Springer-Verlag, 2014, pp. 112-126. Google ScholarDigital Library
- Hicks, M., Sturton, C., King, S.T., and Smith, J.M. Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs, Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ser. ASPLOS. Istanbul, Turkey: ACM, 2015, pp. 517-529. Google ScholarDigital Library
- Forte, D., Bao, C., and Srivastava, A. Temperature Tracking: An Innovative Run-time Approach for Hardware Trojan Detection, International Conference on Computer-Aided Design, ser. ICCAD. IEEE, 2013, pp. 532-539. Google ScholarDigital Library
Index Terms
- Are computer chips the new security threat?
Recommendations
Analysis of Computer Network Security Threat Defense Measures under the Environment of Internet of Things
ICASIT 2020: Proceedings of the 2020 International Conference on Aviation Safety and Information TechnologyThe development of the Internet of Things has overturned the boundaries of traditional information technology, and the processing capabilities and complexity of information technology have grown rapidly. The advancement of the Internet of Things ...
Threat-Based Security Analysis for the Internet of Things
SIOT '14: Proceedings of the 2014 International Workshop on Secure Internet of ThingsThe Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. This technology is anticipated to become an integral milestone in the development of smart homes and smart cities. ...
5G Security Threat Landscape, AI and Blockchain
AbstractThe convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced connectivity and services. However, this combination has also introduced a multifaceted security ...
Comments