期刊文献+

计算机硬件设计安全问题研究 被引量:19

Research on Security Issues of Computer Hardware Design
下载PDF
导出
摘要 随着现代信息技术的飞速发展,计算机的安全问题日益突出,作为计算机安全系统架构的基石,计算机硬件安全越来越得到重视。文章阐述计算机安全的内涵和计算机硬件发展中存在的安全隐患,介绍了计算机硬件设计安全的现状,提出基于内置安全确认和外置辅助安全检测的双重计算机硬件安全策略。 With the rapid development of information technology, computer security issues are increasingly concerned. Compare to software security, hardware security is apparently neglected and should be refined. In this paper, we introduce contents of general information security system and problems of computer hardware design. We propose strategy of hardware security which established on internal security guarantee module and external security detection mocule.
出处 《信息网络安全》 2012年第10期17-19,共3页 Netinfo Security
基金 教育部留学回国人员科研启动基金资助项目 山东省自然科学基金[ZR2009GL007] 山东省高等学校科技计划项目[J09LG10]
关键词 计算机硬件 信息安全 芯片设计 攻击 hardware security information security chip design attack
  • 相关文献

参考文献19

  • 1匡春光,崔益民,张鲁峰,张剑波.基于硬件的计算机安全策略[J].微处理机,2011,32(1):89-91. 被引量:4
  • 2王沁,孙富明,李磊,李笑盈,张晓彤.FPGA设计安全性综述[J].小型微型计算机系统,2010,31(7):1333-1337. 被引量:10
  • 3S. Trimberger, Trusted design in FPGAs [C]. DAC 2007, 5-8, 2007.
  • 4S. Adee, The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34, 39.
  • 5S. Wei, S. Meguerdichian, and M. Potkonjak. Gate-Level Characterization: Foundations and Hardware Security Applications [C]. Design Automation Conference, 2010.
  • 6Y. M. Alkabani, and F. Koushanfar, Active hardware metering for intellectual property protection and security [C]. USENIX Security Symposium, 2007. 1-16.
  • 7N. Beckmann, M. Potkonjak, Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions [C]. Infornaation Hiding Conference, 2009. 206-220.
  • 8B, Gassend, D. Clarke, M. van Dijk, and S. Devadas, Silicon physical random functions.[C]. ACM Conference on Computer and Communications Security, 2002. 148, 160.
  • 9R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, Roadmap for Trusted Hardware - Part I: Hardware Trojan Taxonomy and Design [J]. IEEE Computer Magazine, 2010.
  • 10F. Koushanfar, A. Mirhoseini, and Y. Alkabani, A Unified Submodular Framework for Multimodal IC Trojan Detection [C]. Information Hiding Conference, 2010.

二级参考文献8

共引文献12

同被引文献33

引证文献19

二级引证文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部