
Proceedings Paper
Research on security vulnerability of chipFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
The 21st century is the information era. IC (Integrated Circuit) is the basis of the modern information industry. The
security vulnerability or back door of IC is directly related to the entire information system security. From the
perspective of information security, security vulnerability of chip is led out through the practical examples and then the
importance of security vulnerability of chip is emphasized. By comparing the security vulnerability of chip with the
software virus, the characteristics of the chip vulnerabilities are summed up. Moreover, this paper describes the security
vulnerability models of different control logic chips, combinational and sequential logic chips models. Finally it puts
forward two kinds of detecting methods of security vulnerability of chip against the two models.
Paper Details
Date Published: 20 March 2013
PDF: 6 pages
Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87685B (20 March 2013); doi: 10.1117/12.2011969
Published in SPIE Proceedings Vol. 8768:
International Conference on Graphic and Image Processing (ICGIP 2012)
Zeng Zhu, Editor(s)
PDF: 6 pages
Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87685B (20 March 2013); doi: 10.1117/12.2011969
Show Author Affiliations
Zhifeng Chen, Zhengzhou Institute of Information Science and Technology (China)
Qingbao Li, Zhengzhou Institute of Information Science and Technology (China)
Qingbao Li, Zhengzhou Institute of Information Science and Technology (China)
Zhou Li, Zhengzhou Institute of Information Science and Technology (China)
Published in SPIE Proceedings Vol. 8768:
International Conference on Graphic and Image Processing (ICGIP 2012)
Zeng Zhu, Editor(s)
© SPIE. Terms of Use
