{"title":"A survey of frequently identified vulnerabilities in commercial computing semiconductors","authors":"K. Gotze","doi":"10.1109/HST.2011.5955008","DOIUrl":null,"url":null,"abstract":"This paper summarizes the high level approach taken to security validation by design teams at a CPU Semiconductor manufacturer from architecture, through design, simulation and post-si testing. We review several functional areas that in our experience frequently yield vulnerabilities, describe some of the issues commonly found there, and touch on why these areas can be problematic. By highlighting these issues we hope to encourage future work in academia and industry on techniques to better find, mitigate, or prevent these problems.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2011.5955008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper summarizes the high level approach taken to security validation by design teams at a CPU Semiconductor manufacturer from architecture, through design, simulation and post-si testing. We review several functional areas that in our experience frequently yield vulnerabilities, describe some of the issues commonly found there, and touch on why these areas can be problematic. By highlighting these issues we hope to encourage future work in academia and industry on techniques to better find, mitigate, or prevent these problems.