Part 1: Hardware Trojans and malicious logic.
Connected autonomous vehicles, 5G networks, Internet-of-things (IoT) devices, defense systems, and critical infrastructure use ASIC and FPGA SoCs running artificial intelligence algorithms or other complex software stacks. Vulnerable or tampered ICs can compromise the safety of people and the confidentiality, integrity, and availability of sensitive information. This paper analyzes the trust and security risks in the pre-silicon chip development flow, and considers the industry standards and EDA solutions to address those risks. The target audience includes semiconductor executives, engineering managers, and security experts. The paper is split in two parts. Part 1 focuses on design attacks aiming to insert malicious logic in semiconductor IPs and ICs. Part 2 focuses on architectural and implementation-level bugs, vulnerabilities, and weaknesses that expose hardware to violations of security requirements.
Click here to read more.
Leave a Reply