Polarity-Controllable Silicon Nano Wire Fet-Based Security

Abstract

The emergence of hardware Trojans has largely reshaped the traditional view that the hardware layer can be blindly trusted. Hardware Trojans, which are often in the form of maliciously inserted circuitry, may impact the original design by data leakage or circuit malfunction. Hardware counterfeiting and IP piracy are the other two serious issues costing the U.S. economy more than $200 billion annually [1]. In order to address such threats, various hardware Trojan detection methods and hardware metering methods have been developed [2–6]. Besides circuit-level security solutions, cybersecurity researchers also rely on layered security protection approaches and have developed various methods to protect the higher abstraction layer through security enhancement at the lower abstraction layer. Through this chain, cybersecurity protection schemes have been pushed downward from virtual machine to hypervisor [7]. Following this trend, new methods144 are under development through which the hardware infrastructure is modified to directly support sophisticated security policies so that the system-level protection scheme will be more efficient [8].

Publication Date

1-1-2017

Publication Title

Security Opportunities in Nano Devices and Emerging Technologies

Number of Pages

143-156

Document Type

Article; Book Chapter

Personal Identifier

scopus

DOI Link

https://doi.org/10.1201/9781315265056

Socpus ID

85051829585 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/85051829585

This document is currently not available here.

Share

COinS