skip to main content
research-article

Standards for Hardware Security

Published: 24 July 2019 Publication History

Abstract

Due to the globalization of design, manufacturing and distribution of integrated circuits (ICs), hardware underlying information systems have become increasingly vulnerable to a number of malicious attacks, primarily counterfeiting of ICs and piracy of intellectual properties (IPs). To ensure the security of our critical infrastructure, the use of trusted hardware is absolutely necessary. There are a handful of standards, either currently available today or in progress, that provide guidance to undertake hardware security issues. This article focuses on the standardization activity in the domain of hardware security.

References

[1]
"The Committee's Investigation into Counterfeit Electronic Parts in the Department of Defense Supply Chain," Committee on Armed Services United States Senate, 2011. https://www.govinfo. gov/content/pkg/CHRG-112shrg72702/pdf/ CHRG-112shrg72702.pdf
[2]
"Senate Armed Services Committee Releases Report on Counterfeit Electronic Parts," U.S. Senate Committee on Armed Services Press Release, 2012. https://www.armed-services. senate.gov/press-releases/senate-armed-servicescommittee- releases-report-on-counterfeitelectronic- parts
[3]
R. McCormack, "Boeing's planes are riddled with chinese counterfeit electronic components," Manufacturing and Technology News, Vol. 19, June 2012.
[4]
T. Kaiser, "SAS committee: Counterfeit electronics from China could be harmful to military," Online, DailyTech, November 2011.
[5]
"Top 5 Most Counterfeited Parts Represent a $169 Billion Potential Challenge for Global Semiconductor Market," https://technology.ihs. com/405654/top-5-most-counterfeited-partsrepresent- a-169-billion-potential-challenge-forglobal- semiconductor-market IHS iSuppli, 2011.4
[6]
M. M. Tehranipoor, U. Guin, and D. Forte, Counterfeit Integrated Circuits: Detection and Avoidance. Springer, 2015.
[7]
"National Defense Authorization Act (NDAA) for Fiscal Year 2012," 2012. Public Law 112--81, 112th Congress. https://www.congress.gov/112/plaws/ publ81/PLAW-112publ81.pdf
[8]
"Defense Federal Acquisition Regulation Supplement: Detection and Avoidance of Counterfeit Electronic Parts-Further Implementation (DFARS Case 2014-D005)," 2016. https://www.federalregister.gov/documents/2016/ 08/02/2016--17956/defense-federal-acquisitionregulation- supplement-detection-and-avoidanceof- counterfeit-electronic
[9]
U. Guin, D. DiMase, and M. Tehranipoor, "Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead", Journal of Electronic Testing: Theory and Applications (JETTA), 2014.
[10]
U. Guin, D. DiMase, and M. Tehranipoor, "A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment", Journal of Electronic Testing: Theory and Applications (JETTA), 2014.
[11]
"Chinese Telecommunications Device Manufacturer and its U.S. Affiliate Indicted for Theft of Trade Secrets, Wire Fraud, and Obstruction Of Justice," U.S. Dept. of Justice https://www.justice.gov/opa/pr/chinesetelecommunications- device-manufacturer-andits- us-affiliate-indicted-theft-trade
[12]
"Copyrights and patents, piracy and theft," The Washington Times. https://www. washingtontimes.com/news/2018/apr/24/ copyrights-and-patents-piracy-and-theft/
[13]
"2017 Special 301 Report," Office of the United States Trade Representative, 2017. https://ustr.gov/ sites/default/files/301/2017%20Special%20301 %20Report%20FINAL.PDF
[14]
J. H. McQuade and D. M. S. Fassbender, "Senate Judiciary Committee Creates IP Subcommittee to Combat IP Theft," Mondaq. http://www.mondaq. com/unitedstates/x/781874/Trademark/
[15]
U. Guin, Q. Shi, D. Forte, and M. Tehranipoor, "FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs", ACM Transactions on Design Automation of Electronic Systems (TODAES), 2016.
[16]
A. Chhotaray, A. Nahiyan, T. Shrimpton, D. Forte, and M. Tehranipoor. "Standardizing bad cryptographic practice: A teardown of the IEEE standard for protecting electronic-design intellectual property." In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1533--1546. ACM, 2017.

Cited By

View all
  • (2023)Hardware Trojan InsertionHardware Security Training, Hands-on!10.1007/978-3-031-31034-8_5(73-92)Online publication date: 30-Jun-2023
  • (2022)DRAM Retention Behavior with Accelerated Aging in Commercial ChipsApplied Sciences10.3390/app1209433212:9(4332)Online publication date: 25-Apr-2022
  • (2021)Estimating Operational Age of an Integrated CircuitJournal of Electronic Testing: Theory and Applications10.1007/s10836-021-05927-337:1(25-40)Online publication date: 1-Feb-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image GetMobile: Mobile Computing and Communications
GetMobile: Mobile Computing and Communications  Volume 23, Issue 1
March 2019
34 pages
ISSN:2375-0529
EISSN:2375-0537
DOI:10.1145/3351422
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 July 2019
Published in SIGMOBILE-GETMOBILE Volume 23, Issue 1

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Hardware Trojan InsertionHardware Security Training, Hands-on!10.1007/978-3-031-31034-8_5(73-92)Online publication date: 30-Jun-2023
  • (2022)DRAM Retention Behavior with Accelerated Aging in Commercial ChipsApplied Sciences10.3390/app1209433212:9(4332)Online publication date: 25-Apr-2022
  • (2021)Estimating Operational Age of an Integrated CircuitJournal of Electronic Testing: Theory and Applications10.1007/s10836-021-05927-337:1(25-40)Online publication date: 1-Feb-2021
  • (2020)A Robust, Low-Cost and Secure Authentication Scheme for IoT ApplicationsCryptography10.3390/cryptography40100084:1(8)Online publication date: 8-Mar-2020
  • (2020)A Zero-Cost Detection Approach for Recycled ICs using Scan Architecture2020 IEEE 38th VLSI Test Symposium (VTS)10.1109/VTS48691.2020.9107583(1-6)Online publication date: Apr-2020
  • (2020)Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST45689.2020.9300125(111-121)Online publication date: 7-Dec-2020
  • (2020)A Novel Approach for Analyzing the Nuclear Supply Chain Cyber-Attack SurfaceNuclear Engineering and Technology10.1016/j.net.2020.08.021Online publication date: Sep-2020
  • (2020)Introduction to Cyber SecurityNew Frontiers in Cryptography10.1007/978-3-030-58996-7_1(1-12)Online publication date: 17-Oct-2020
  • (2019)A Blockchain-Based Framework for Supply Chain ProvenanceIEEE Access10.1109/ACCESS.2019.29499517(157113-157125)Online publication date: 2019
  • (2019)Blockchain in IoT: Current Trends, Challenges, and Future RoadmapJournal of Hardware and Systems Security10.1007/s41635-019-00079-5Online publication date: 4-Nov-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media