{"title":"硬件安全挑战超越CMOS:攻击和补救措施","authors":"Kaveh Shamsi, Wujie Wen, Yier Jin","doi":"10.1109/ISVLSI.2016.93","DOIUrl":null,"url":null,"abstract":"The globalization of Integrated Circuits (ICs) supply chain has raised security concerns on how to ensure the integrity and the trustworthiness of fabricated circuits. While existing attack and protection methods are developed for CMOS based circuits, the introduction of emerging transistors acts as a double-sided sword. The usage of emerging devices introduces new security issues which the attackers can leverage to launch hardware attacks. On the other hand, the unique properties of emerging devices also provides a great opportunity for defenders to develop innovative hardware security primitives and to construct resilient hardware platforms for cybersecurity. In this paper, we will summarize the previous work in both directions, attacks and remedies with a focus on the authors' previous work in this domain. We will also discuss the research trends so that the emerging devices can better help secure our computing systems, besides their roles in extending the Moore's Law.","PeriodicalId":140647,"journal":{"name":"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Hardware Security Challenges Beyond CMOS: Attacks and Remedies\",\"authors\":\"Kaveh Shamsi, Wujie Wen, Yier Jin\",\"doi\":\"10.1109/ISVLSI.2016.93\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The globalization of Integrated Circuits (ICs) supply chain has raised security concerns on how to ensure the integrity and the trustworthiness of fabricated circuits. While existing attack and protection methods are developed for CMOS based circuits, the introduction of emerging transistors acts as a double-sided sword. The usage of emerging devices introduces new security issues which the attackers can leverage to launch hardware attacks. On the other hand, the unique properties of emerging devices also provides a great opportunity for defenders to develop innovative hardware security primitives and to construct resilient hardware platforms for cybersecurity. In this paper, we will summarize the previous work in both directions, attacks and remedies with a focus on the authors' previous work in this domain. We will also discuss the research trends so that the emerging devices can better help secure our computing systems, besides their roles in extending the Moore's Law.\",\"PeriodicalId\":140647,\"journal\":{\"name\":\"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISVLSI.2016.93\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISVLSI.2016.93","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hardware Security Challenges Beyond CMOS: Attacks and Remedies
The globalization of Integrated Circuits (ICs) supply chain has raised security concerns on how to ensure the integrity and the trustworthiness of fabricated circuits. While existing attack and protection methods are developed for CMOS based circuits, the introduction of emerging transistors acts as a double-sided sword. The usage of emerging devices introduces new security issues which the attackers can leverage to launch hardware attacks. On the other hand, the unique properties of emerging devices also provides a great opportunity for defenders to develop innovative hardware security primitives and to construct resilient hardware platforms for cybersecurity. In this paper, we will summarize the previous work in both directions, attacks and remedies with a focus on the authors' previous work in this domain. We will also discuss the research trends so that the emerging devices can better help secure our computing systems, besides their roles in extending the Moore's Law.