当前位置:网站首页>Onespin | solve the problems of hardware Trojan horse and security trust in IC Design
Onespin | solve the problems of hardware Trojan horse and security trust in IC Design
2022-07-07 20:27:00 【Maihexong】
stride across 5G, Artificial intelligence , The Internet of things and the automotive sector 40 Several organizations have expressed the importance of trust and security dilemmas .
Electronic systems have increasingly become the core of products and services . From power plants to cars , Medical equipment to the plane , From smart phones to home appliances , Complex electronic systems have achieved unprecedented Automation , performance , Safety and security level . The integrated circuit (IC) It is the foundation of electronic system , And the most important thing is , Need to ensure that they operate in full compliance with specifications and Certification , In this regard, it is trustworthy . but IC The design of the , Production and distribution are vulnerable to attacks by malicious agents , These malicious agents may penetrate devices with poor performance and reliability , Even infiltrate into the hardware Trojan horse , Other hidden functions designed for malicious purposes .
A well-designed hardware Trojan horse , Can respond to triggers known to the attacker , Thus causing significant damage . It may expose “ Security ” data , Cause serious product failure , Even damage the chip . In modern times , Highly configurable hardware is a backdoor 、 Time bomb 、 Provide a good hiding place for the switch to stop or degrade . Like a Trojan horse program being inserted into a third party IP And threats in the design and implementation steps before production , It is increasingly attracting extensive attention in the hardware industry . Networked driverless cars , Medical equipment , A smart phone , Defense and aerospace systems , nuclear power plant ,5G The Internet , Internet of things devices and cloud computing , Everything is at risk here .
The company is obliged to ensure that electronic equipment is protected from security attacks that may cause great harm .OneSpin Hardware trust and security challenges illustrate , Face hidden in the whole IC Trojans in the development phase , How fragile the design is , meanwhile , It also tells us how to fight it .
About OneSpin Solutions for
OneSpin President and CEO Raik Brinkmann mention : Now more and more companies realize that , The importance of protecting hardware design from trust and security risks . The loopholes left in the design , Whether unintentional or malicious , Can have disastrous consequences . Be able to fully detect these in the design “ Loophole ”, For delivering security to the market , Reliable and trustworthy equipment is essential . As IC Part of integrity , In terms of ensuring trust and security at the hardware level ,OneSpin The technical services provided have always been at the forefront of the industry .”
More details and white papers :http://www.softtest.cn
边栏推荐
- Jenkins 用户权限管理
- CodeSonar网络研讨会
- EasyGBS级联时,上级平台重启导致推流失败、画面卡住该如何解决?
- [paper reading] maps: Multi-Agent Reinforcement Learning Based Portfolio Management System
- 论文解读(ValidUtil)《Rethinking the Setting of Semi-supervised Learning on Graphs》
- 九度 1201 -二叉排序数遍历- 二叉排序树「建议收藏」
- VMWare中虚拟机网络配置
- I wrote a markdown command line gadget, hoping to improve the efficiency of sending documents by garden friends!
- H3C S7000/S7500E/10500系列堆叠后BFD检测配置方法
- PHP method of obtaining image information
猜你喜欢
C语言多角度帮助你深入理解指针(1. 字符指针2. 数组指针和 指针数组 、数组传参和指针传参3. 函数指针4. 函数指针数组5. 指向函数指针数组的指针6. 回调函数)
Klocwork code static analysis tool
ERROR: 1064 (42000): You have an error in your SQL syntax; check the manual that corresponds to your
微服务远程Debug,Nocalhost + Rainbond微服务开发第二弹
How to test CIS chip?
智能软件分析平台Embold
Apifox 接口一体化管理新神器
[philosophy and practice] the way of program design
Yolov6:yolov6+win10--- train your own dataset
复杂因子计算优化案例:深度不平衡、买卖压力指标、波动率计算
随机推荐
Oracle 存储过程之遍历
不落人后!简单好用的低代码开发,快速搭建智慧管理信息系统
Optimization cases of complex factor calculation: deep imbalance, buying and selling pressure index, volatility calculation
Is it safe to open a stock account at present? Can I open an account online directly.
【解决】package ‘xxxx‘ is not in GOROOT
微服务远程Debug,Nocalhost + Rainbond微服务开发第二弹
图扑数字孪生煤矿开采系统,打造采煤“硬实力”
Phoenix JDBC
机械臂速成小指南(十二):逆运动学分析
Lingyun going to sea | saihe & Huawei cloud: jointly help the sustainable development of cross-border e-commerce industry
C语言多角度帮助你深入理解指针(1. 字符指针2. 数组指针和 指针数组 、数组传参和指针传参3. 函数指针4. 函数指针数组5. 指向函数指针数组的指针6. 回调函数)
VMWare中虚拟机网络配置
如何满足医疗设备对安全性和保密性的双重需求?
Tensorflow2.x下如何运行1.x的代码
How to implement safety practice in software development stage
PHP method of obtaining image information
Nebula Importer 数据导入实践
写了个 Markdown 命令行小工具,希望能提高园友们发文的效率!
Oracle 存儲過程之遍曆
写一下跳表