{"title":"联机信任验证的解决方案","authors":"M. Abramovici","doi":"10.1109/HST.2008.4559058","DOIUrl":null,"url":null,"abstract":"Summary form only given. We show that pre-deployment checks are unlikely to guarantee the detection of Trojans using a time-bomb mechanism for activation. We describe a new approach to on-line TRUST validation based on extensions to an existing technology for in-system silicon validation. The basis is a reconfigurable infrastructure platform added to the RTL model of the target SoC. The platform can be configured to implement design-for-enabling-security (DEFENSE) logic consisting of security monitors and logic to provide countermeasures to detected attacks.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"100 1","pages":"100-100"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A solution for on-line trust validation\",\"authors\":\"M. Abramovici\",\"doi\":\"10.1109/HST.2008.4559058\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Summary form only given. We show that pre-deployment checks are unlikely to guarantee the detection of Trojans using a time-bomb mechanism for activation. We describe a new approach to on-line TRUST validation based on extensions to an existing technology for in-system silicon validation. The basis is a reconfigurable infrastructure platform added to the RTL model of the target SoC. The platform can be configured to implement design-for-enabling-security (DEFENSE) logic consisting of security monitors and logic to provide countermeasures to detected attacks.\",\"PeriodicalId\":6574,\"journal\":{\"name\":\"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"volume\":\"100 1\",\"pages\":\"100-100\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-06-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HST.2008.4559058\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2008.4559058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Summary form only given. We show that pre-deployment checks are unlikely to guarantee the detection of Trojans using a time-bomb mechanism for activation. We describe a new approach to on-line TRUST validation based on extensions to an existing technology for in-system silicon validation. The basis is a reconfigurable infrastructure platform added to the RTL model of the target SoC. The platform can be configured to implement design-for-enabling-security (DEFENSE) logic consisting of security monitors and logic to provide countermeasures to detected attacks.