This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
January/February 2010 (vol. 27 no. 1)
pp. 8-9
Mohammad Tehranipoor, University of Connecticut
Farinaz Koushanfar, Rice University

The emergence of a globalized, horizontal semiconductor business model raises concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Traditionally, hardware-based security techniques and countermeasures modify hardware to prevent attacks and to protect IP blocks or secret keys. Some of the emerging types of attacks covered by this special issue are fundamentally different: the attacker is assumed to maliciously alter the design before or during fabrication.

Index Terms:
design and test, hardware Trojans, IP protection, secret key, security measures, Trojan attack
Citation:
Mohammad Tehranipoor, Farinaz Koushanfar, "Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 8-9, Jan.-Feb. 2010, doi:10.1109/MDT.2010.20
Usage of this product signifies your acceptance of the Terms of Use.