当前位置:网站首页>Onespin | solve the problems of hardware Trojan horse and security trust in IC Design
Onespin | solve the problems of hardware Trojan horse and security trust in IC Design
2022-07-07 20:27:00 【Maihexong】
stride across 5G, Artificial intelligence , The Internet of things and the automotive sector 40 Several organizations have expressed the importance of trust and security dilemmas .
Electronic systems have increasingly become the core of products and services . From power plants to cars , Medical equipment to the plane , From smart phones to home appliances , Complex electronic systems have achieved unprecedented Automation , performance , Safety and security level . The integrated circuit (IC) It is the foundation of electronic system , And the most important thing is , Need to ensure that they operate in full compliance with specifications and Certification , In this regard, it is trustworthy . but IC The design of the , Production and distribution are vulnerable to attacks by malicious agents , These malicious agents may penetrate devices with poor performance and reliability , Even infiltrate into the hardware Trojan horse , Other hidden functions designed for malicious purposes .
A well-designed hardware Trojan horse , Can respond to triggers known to the attacker , Thus causing significant damage . It may expose “ Security ” data , Cause serious product failure , Even damage the chip . In modern times , Highly configurable hardware is a backdoor 、 Time bomb 、 Provide a good hiding place for the switch to stop or degrade . Like a Trojan horse program being inserted into a third party IP And threats in the design and implementation steps before production , It is increasingly attracting extensive attention in the hardware industry . Networked driverless cars , Medical equipment , A smart phone , Defense and aerospace systems , nuclear power plant ,5G The Internet , Internet of things devices and cloud computing , Everything is at risk here .
The company is obliged to ensure that electronic equipment is protected from security attacks that may cause great harm .OneSpin Hardware trust and security challenges illustrate , Face hidden in the whole IC Trojans in the development phase , How fragile the design is , meanwhile , It also tells us how to fight it .
About OneSpin Solutions for
OneSpin President and CEO Raik Brinkmann mention : Now more and more companies realize that , The importance of protecting hardware design from trust and security risks . The loopholes left in the design , Whether unintentional or malicious , Can have disastrous consequences . Be able to fully detect these in the design “ Loophole ”, For delivering security to the market , Reliable and trustworthy equipment is essential . As IC Part of integrity , In terms of ensuring trust and security at the hardware level ,OneSpin The technical services provided have always been at the forefront of the industry .”
More details and white papers :http://www.softtest.cn
边栏推荐
- Try the tuiroom of Tencent cloud (there is an appointment in the evening, which will be continued...)
- Traversal of Oracle stored procedures
- 实战:sqlserver 2008 扩展事件-XML转换为标准的table格式[通俗易懂]
- 智能软件分析平台Embold
- Precautions for cjson memory leakage
- VMWare中虚拟机网络配置
- 嵌入式系统真正安全了吗?[ OneSpin如何为开发团队全面解决IC完整性问题 ]
- Airiot helps the urban pipe gallery project, and smart IOT guards the lifeline of the city
- [paper reading] maps: Multi-Agent Reinforcement Learning Based Portfolio Management System
- Spark judges that DF is empty
猜你喜欢
Small guide for rapid formation of manipulator (12): inverse kinematics analysis
一键部署Redis任意版本
Tensorflow2. How to run under x 1 Code of X
Small guide for rapid formation of manipulator (11): standard nomenclature of coordinate system
Jenkins 用户权限管理
Opencv learning notes high dynamic range (HDR) imaging
How does codesonar help UAVs find software defects?
CodeSonar网络研讨会
机械臂速成小指南(十二):逆运动学分析
微服务远程Debug,Nocalhost + Rainbond微服务开发第二弹
随机推荐
OneSpin 360 DV新版发布,刷新FPGA形式化验证功能体验
[award publicity] issue 22 publicity of the award list in June 2022: Community star selection | Newcomer Award | blog synchronization | recommendation Award
Traversée des procédures stockées Oracle
开发那些事儿:Go加C.free释放内存,编译报错是什么原因?
POJ 1742 coins (monotone queue solution) [suggestions collection]
Phoenix JDBC
Micro service remote debug, nocalhost + rainbow micro service development second bullet
Splicing and splitting of integer ints
Cantata9.0 | new features
数值法求解最优控制问题(〇)——定义
网络原理(1)——基础原理概述
Get webkitformboundary post login
Deep learning model compression and acceleration technology (VII): mixed mode
Make this crmeb single merchant wechat mall system popular, so easy to use!
Validutil, "Rethinking the setting of semi supervised learning on graphs"
ERROR: 1064 (42000): You have an error in your SQL syntax; check the manual that corresponds to your
Precautions for cjson memory leakage
One click deployment of any version of redis
Flask1.1.4 Werkzeug1.0.1 源码分析:路由
Measure the height of the building