YoVDO

ICAS - An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans

Offered By: IEEE via YouTube

Tags

Hardware Security Courses System Security Courses

Course Description

Overview

Explore an extensible framework for estimating integrated circuit (IC) layout vulnerability to additive trojans in this 17-minute IEEE conference talk. Delve into the importance of hardware security, the IC development process, and the challenges posed by outsourcing. Examine various hardware flaws, untrusted foundry defenses, and the intricacies of IC construction. Learn about hardware trojan insertion methods and the ICAS (Integrated Circuit Attack Surface) metrics. Evaluate preventive layout-level defenses and their impact on the attack surface. Gain insights into the current state of systems security and the critical role of hardware as the foundation for overall system integrity.

Syllabus

Intro
Hardware is the Foundation!
State of Systems Security
Hardware Development Process
Outsourcing Reduces Trust
Hardware Flaws
Untrusted Foundry Defenses
Integrated Circuit Construction
How are Hardware Trojans Inserted?
ICAS: Integrated Circuit Attack Surface
ICAS Metrics
Justification for Metrics
Evaluation
Preventive Layout-Level Defenses
Attack Surface with Undirected Defense
Conclusion
Questions?


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Enterprise System Management and Security
University of Colorado System via Coursera
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
PHP: Complete Login and Registration System with PHP & MYSQL
Udemy
Learn Ethical Hacking From Scratch 2024
Udemy
Serie Windows Server Update Services (WSUS)
Udemy