20 March 2013 Research on security vulnerability of chip
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 87685B (2013) https://doi.org/10.1117/12.2011969
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
The 21st century is the information era. IC (Integrated Circuit) is the basis of the modern information industry. The security vulnerability or back door of IC is directly related to the entire information system security. From the perspective of information security, security vulnerability of chip is led out through the practical examples and then the importance of security vulnerability of chip is emphasized. By comparing the security vulnerability of chip with the software virus, the characteristics of the chip vulnerabilities are summed up. Moreover, this paper describes the security vulnerability models of different control logic chips, combinational and sequential logic chips models. Finally it puts forward two kinds of detecting methods of security vulnerability of chip against the two models.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhifeng Chen, Zhifeng Chen, Qingbao Li, Qingbao Li, Zhou Li, Zhou Li, } "Research on security vulnerability of chip", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87685B (20 March 2013); doi: 10.1117/12.2011969; https://doi.org/10.1117/12.2011969
PROCEEDINGS
6 PAGES


SHARE
RELATED CONTENT

Mobile code security
Proceedings of SPIE (November 07 2001)
Computer loss experience and predictions
Proceedings of SPIE (March 11 1996)
High-speed interconnection for storage area networks
Proceedings of SPIE (April 08 2003)
End-to-end communications security
Proceedings of SPIE (April 17 2006)

Back to Top