Jump to ContentJump to Main Navigation
Show Summary Details
More options …

it - Information Technology

Methods and Applications of Informatics and Information Technology

Editor-in-Chief: Conrad, Stefan / Molitor, Paul

6 Issues per year

Online
ISSN
2196-7032
See all formats and pricing
More options …
Volume 56, Issue 4

Issues

Hardware security and test: Friends or enemies?

Ilia Polian
Published Online: 2014-07-21 | DOI: https://doi.org/10.1515/itit-2013-1038

Abstract

Hardware security is a relatively new scientific discipline which focuses on adversarial threats to hardware components of complex systems and infrastructures, including manipulation, unauthorized access to confidential data, and intellectual property theft. State-of-the-art test methods can contribute to detection and elimination of security threats but also may introduce new vulnerabilities. This article will explain this dichotomy and outline current research challenges.

Keywords: ACM CCS →Hardware →Hardware test; ACM CCS→Security and privacy →Security in hardware; Hardware security; hardware test; attacks; reliability; design-for-testability; anti-counterfeiting

About the article

Ilia Polian

Ilia Polian is Chair of Computer Engineering at the University of Passau, Germany, and currently serves as Dean of the Faculty of Computer Science and Mathematics. His research intersts are design and test of secure and reliable electronic circuits and systems, as well as emerging and unconventional computing paradigms. Prof. Polian is Vice-Speaker of the COST-Action “Trustworthy Manufacturing and Utilization of Secure Devices”, which currently has members from 22 European countries.

Innstr. 43, 94032 Passau


Accepted: 2014-02-26

Received: 2013-10-29

Published Online: 2014-07-21

Published in Print: 2014-08-28


Citation Information: it - Information Technology, Volume 56, Issue 4, Pages 192–202, ISSN (Online) 2196-7032, ISSN (Print) 1611-2776, DOI: https://doi.org/10.1515/itit-2013-1038.

Export Citation

©2014 Walter de Gruyter Berlin/Boston.Get Permission

Comments (0)

Please log in or register to comment.
Log in