2017
DOI: 10.1109/tifs.2017.2707323
|View full text |Cite
|
Sign up to set email alerts
|

Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP—Part I: Framework Fundamentals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…But encryption is not enough because data is still vulnerable for attacks such as eavesdropping. To prevent this kind of behavior, encryption have to be enforced with access control policy at its base station [31] [32].…”
Section: Discussionmentioning
confidence: 99%
“…But encryption is not enough because data is still vulnerable for attacks such as eavesdropping. To prevent this kind of behavior, encryption have to be enforced with access control policy at its base station [31] [32].…”
Section: Discussionmentioning
confidence: 99%
“…We believe that this is a reasonable assumption in a scenario where the IP provider may disclose IP cores to allow the customer to verify the fulfilment of a previously agreed trustworthiness level. Such assumption is the same as in several hardware securityrelated papers working both at the HDL [26,27] and netlist level [28,29]. Finally, in the increasing trend of Open Hardware, it is common to share IP designs.…”
Section: Hardware Trojansmentioning
confidence: 92%
“…IFT-based methods have been also developed for hardware trustworthiness, targeting the RTL designs. Proof-Carrying Hardware (PCH) [4,21,27,32] veriies the equivalence between the design speciication and its implementation using run-time Combinational Equivalence Checking (CEC). However, converting RTL code to a formal representation and developing proofs for security properties, requires additional knowledge of formal methods, theorem proving environments, and proof-writing.…”
Section: Related Workmentioning
confidence: 99%