D. Belyakov, E. O. Kalinin, A. Konev, A. Shelupanov, Artur Mitsel
{"title":"微芯片开发开发过程中的生命周期模型及安全威胁","authors":"D. Belyakov, E. O. Kalinin, A. Konev, A. Shelupanov, Artur Mitsel","doi":"10.21293/1818-0442-2023-26-1-76-81","DOIUrl":null,"url":null,"abstract":"The growth of Internet of Things devices has shown the need to advance the information security and more specifically the development and operation of microchips, as modern information systems are built around the latter. This article presents the lifecycle of secure chips used as the Root of Trust of information systems. The main stages of the life cycle of protected chips are described, namely life cycle models during development and operation by the end user.","PeriodicalId":273068,"journal":{"name":"Proceedings of Tomsk State University of Control Systems and Radioelectronics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Life-cycle models and security threats to the microchip during its development and exploitation\",\"authors\":\"D. Belyakov, E. O. Kalinin, A. Konev, A. Shelupanov, Artur Mitsel\",\"doi\":\"10.21293/1818-0442-2023-26-1-76-81\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The growth of Internet of Things devices has shown the need to advance the information security and more specifically the development and operation of microchips, as modern information systems are built around the latter. This article presents the lifecycle of secure chips used as the Root of Trust of information systems. The main stages of the life cycle of protected chips are described, namely life cycle models during development and operation by the end user.\",\"PeriodicalId\":273068,\"journal\":{\"name\":\"Proceedings of Tomsk State University of Control Systems and Radioelectronics\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of Tomsk State University of Control Systems and Radioelectronics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21293/1818-0442-2023-26-1-76-81\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of Tomsk State University of Control Systems and Radioelectronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21293/1818-0442-2023-26-1-76-81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Life-cycle models and security threats to the microchip during its development and exploitation
The growth of Internet of Things devices has shown the need to advance the information security and more specifically the development and operation of microchips, as modern information systems are built around the latter. This article presents the lifecycle of secure chips used as the Root of Trust of information systems. The main stages of the life cycle of protected chips are described, namely life cycle models during development and operation by the end user.