skip to main content
10.1145/1558607.1558671acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Integrated circuit security: new threats and solutions

Published: 13 April 2009 Publication History

Abstract

In this paper, we present new threats to the security of integrated circuits (ICs) and outline a new solution.

Reference

[1]
M. Abramovici, P. Bradley, K. Dwarakanath, P. Levin, G. Memmi, and D. Miller, "A Reconfigurable Design-for-Debug Infrastructure for SoCs," Proc. ACM/IEEE Design Automation Conf., July, 2006

Cited By

View all
  • (2025)Security Verification of System-on-Chips (SoCs)Encyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1647(2352-2354)Online publication date: 8-Jan-2025
  • (2024)MLConnect: A Machine Learning Based Connection Prediction Framework for Error Correction in Recovered Circuit2024 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS58744.2024.10558237(1-5)Online publication date: 19-May-2024
  • (2022)Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation TechniquesEMITTER International Journal of Engineering Technology10.24003/emitter.v10i2.716(370-388)Online publication date: 30-Dec-2022
  • Show More Cited By
  1. Integrated circuit security: new threats and solutions

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
      April 2009
      952 pages
      ISBN:9781605585185
      DOI:10.1145/1558607
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 April 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. countermeasures
      2. detection
      3. integrated circuits
      4. security
      5. tampering attacks
      6. trojan attacks

      Qualifiers

      • Research-article

      Conference

      CSIIRW '09

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)24
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Security Verification of System-on-Chips (SoCs)Encyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1647(2352-2354)Online publication date: 8-Jan-2025
      • (2024)MLConnect: A Machine Learning Based Connection Prediction Framework for Error Correction in Recovered Circuit2024 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS58744.2024.10558237(1-5)Online publication date: 19-May-2024
      • (2022)Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation TechniquesEMITTER International Journal of Engineering Technology10.24003/emitter.v10i2.716(370-388)Online publication date: 30-Dec-2022
      • (2022)Survey on Enterprise Internet-of-Things systems (E-IoT)Ad Hoc Networks10.1016/j.adhoc.2021.102728125:COnline publication date: 1-Feb-2022
      • (2022)A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and preventionJournal of Cryptographic Engineering10.1007/s13389-022-00295-w12:4(495-522)Online publication date: 16-Jul-2022
      • (2021)Jintide: Utilizing Low-Cost Reconfigurable External Monitors to Substantially Enhance Hardware Security of Large-Scale CPU ClustersIEEE Journal of Solid-State Circuits10.1109/JSSC.2021.305855156:8(2585-2601)Online publication date: Aug-2021
      • (2021)Securing Hardware from Malicious Attacks2021 16th International Conference on Computer Engineering and Systems (ICCES)10.1109/ICCES54031.2021.9686147(1-4)Online publication date: 15-Dec-2021
      • (2021)Design for Trust Using Transition ProbabilityMicroelectronic Devices, Circuits and Systems10.1007/978-981-16-5048-2_6(69-79)Online publication date: 3-Aug-2021
      • (2021)Transition Probability-Based Detection of Hardware Trojan in Digital CircuitsProceedings of Sixth International Congress on Information and Communication Technology10.1007/978-981-16-2377-6_57(619-627)Online publication date: 24-Sep-2021
      • (2021)Security Verification of System-on-Chips (SoCs)Encyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1647-1(1-3)Online publication date: 27-Apr-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media