Главная
Study mode:
on
1
Intro
2
Hardware is the Foundation!
3
State of Systems Security
4
Hardware Development Process
5
Outsourcing Reduces Trust
6
Hardware Flaws
7
Untrusted Foundry Defenses
8
Integrated Circuit Construction
9
How are Hardware Trojans Inserted?
10
ICAS: Integrated Circuit Attack Surface
11
ICAS Metrics
12
Justification for Metrics
13
Evaluation
14
Preventive Layout-Level Defenses
15
Attack Surface with Undirected Defense
16
Conclusion
17
Questions?
Description:
Explore an extensible framework for estimating integrated circuit (IC) layout vulnerability to additive trojans in this 17-minute IEEE conference talk. Delve into the importance of hardware security, the IC development process, and the challenges posed by outsourcing. Examine various hardware flaws, untrusted foundry defenses, and the intricacies of IC construction. Learn about hardware trojan insertion methods and the ICAS (Integrated Circuit Attack Surface) metrics. Evaluate preventive layout-level defenses and their impact on the attack surface. Gain insights into the current state of systems security and the critical role of hardware as the foundation for overall system integrity.

ICAS - An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans

IEEE
Add to list
0:00 / 0:00