当前位置:网站首页>Onespin | solve the problems of hardware Trojan horse and security trust in IC Design
Onespin | solve the problems of hardware Trojan horse and security trust in IC Design
2022-07-07 20:27:00 【Maihexong】
stride across 5G, Artificial intelligence , The Internet of things and the automotive sector 40 Several organizations have expressed the importance of trust and security dilemmas .
Electronic systems have increasingly become the core of products and services . From power plants to cars , Medical equipment to the plane , From smart phones to home appliances , Complex electronic systems have achieved unprecedented Automation , performance , Safety and security level . The integrated circuit (IC) It is the foundation of electronic system , And the most important thing is , Need to ensure that they operate in full compliance with specifications and Certification , In this regard, it is trustworthy . but IC The design of the , Production and distribution are vulnerable to attacks by malicious agents , These malicious agents may penetrate devices with poor performance and reliability , Even infiltrate into the hardware Trojan horse , Other hidden functions designed for malicious purposes .
A well-designed hardware Trojan horse , Can respond to triggers known to the attacker , Thus causing significant damage . It may expose “ Security ” data , Cause serious product failure , Even damage the chip . In modern times , Highly configurable hardware is a backdoor 、 Time bomb 、 Provide a good hiding place for the switch to stop or degrade . Like a Trojan horse program being inserted into a third party IP And threats in the design and implementation steps before production , It is increasingly attracting extensive attention in the hardware industry . Networked driverless cars , Medical equipment , A smart phone , Defense and aerospace systems , nuclear power plant ,5G The Internet , Internet of things devices and cloud computing , Everything is at risk here .
The company is obliged to ensure that electronic equipment is protected from security attacks that may cause great harm .OneSpin Hardware trust and security challenges illustrate , Face hidden in the whole IC Trojans in the development phase , How fragile the design is , meanwhile , It also tells us how to fight it .
About OneSpin Solutions for
OneSpin President and CEO Raik Brinkmann mention : Now more and more companies realize that , The importance of protecting hardware design from trust and security risks . The loopholes left in the design , Whether unintentional or malicious , Can have disastrous consequences . Be able to fully detect these in the design “ Loophole ”, For delivering security to the market , Reliable and trustworthy equipment is essential . As IC Part of integrity , In terms of ensuring trust and security at the hardware level ,OneSpin The technical services provided have always been at the forefront of the industry .”
More details and white papers :http://www.softtest.cn
边栏推荐
- Cantata9.0 | 全 新 功 能
- Lingyun going to sea | yidiantianxia & Huawei cloud: promoting the globalization of Chinese e-commerce enterprise brands
- With st7008, the Bluetooth test is completely grasped
- How to choose fund products? What fund is suitable to buy in July 2022?
- Mongodb由浅入深学习
- 使用高斯Redis实现二级索引
- Vulnhub's funfox2
- 图扑数字孪生煤矿开采系统,打造采煤“硬实力”
- 使用高斯Redis实现二级索引
- How to test CIS chip?
猜你喜欢
![About cv2 dnn. Readnetfromonnx (path) reports error during processing node with 3 inputs and 1 outputs [exclusive release]](/img/59/33381b8d45401607736f05907ee381.png)
About cv2 dnn. Readnetfromonnx (path) reports error during processing node with 3 inputs and 1 outputs [exclusive release]

Small guide for rapid formation of manipulator (11): standard nomenclature of coordinate system

Mongodb learn from simple to deep

ISO 26262 - 基于需求测试以外的考虑因素

Yolov6:yolov6+win10--- train your own dataset

School 1 of vulnhub

不落人后!简单好用的低代码开发,快速搭建智慧管理信息系统

I wrote a markdown command line gadget, hoping to improve the efficiency of sending documents by garden friends!

Apifox interface integrated management new artifact

Implement secondary index with Gaussian redis
随机推荐
How C language determines whether it is a 32-bit system or a 64 bit system
嵌入式系统真正安全了吗?[ OneSpin如何为开发团队全面解决IC完整性问题 ]
Jenkins 用户权限管理
想杀死某个端口进程,但在服务列表中却找不到,可以之间通过命令行找到这个进程并杀死该进程,减少重启电脑和找到问题根源。
CodeSonar如何帮助无人机查找软件缺陷?
Mrs offline data analysis: process OBS data through Flink job
php 获取图片信息的方法
Flask1.1.4 Werkzeug1.0.1 源码分析:路由
如何满足医疗设备对安全性和保密性的双重需求?
上海交大最新《标签高效深度分割》研究进展综述,全面阐述无监督、粗监督、不完全监督和噪声监督的深度分割方法
九度 1201 -二叉排序数遍历- 二叉排序树「建议收藏」
怎样用Google APIs和Google的应用系统进行集成(1)—-Google APIs简介
Écrivez une liste de sauts
CodeSonar通过创新型静态分析增强软件可靠性
Implement secondary index with Gaussian redis
Prometheus remote_write InfluxDB,unable to parse authentication credentials,authorization failed
You want to kill a port process, but you can't find it in the service list. You can find this process and kill it through the command line to reduce restarting the computer and find the root cause of
Measure the height of the building
网络原理(1)——基础原理概述
POJ 1742 coins (monotone queue solution) [suggestions collection]