Issue No. 01 - January/February (2010 vol. 27)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MDT.2010.20
Mohammad Tehranipoor , University of Connecticut
Farinaz Koushanfar , Rice University
<p>The emergence of a globalized, horizontal semiconductor business model raises concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Traditionally, hardware-based security techniques and countermeasures modify hardware to prevent attacks and to protect IP blocks or secret keys. Some of the emerging types of attacks covered by this special issue are fundamentally different: the attacker is assumed to maliciously alter the design before or during fabrication.</p>
design and test, hardware Trojans, IP protection, secret key, security measures, Trojan attack
M. Tehranipoor and F. Koushanfar, "Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem," in IEEE Design & Test of Computers, vol. 27, no. , pp. 8-9, 2010.