A Primer on Hardware Security: Models, Methods, and Metrics
|Title||A Primer on Hardware Security: Models, Methods, and Metrics|
|Publication Type||Journal Article|
|Year of Publication||2014|
|Authors||Rostami, M., F. Koushanfar, and R. Karri|
|Journal||Proceedings of the IEEE|
|Keywords||Counterfeiting, hardware Trojans, IP piracy, reverse engineering, side-channel attacks|
The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.