计算机科学技术学报(英文版)
計算機科學技術學報(英文版)
계산궤과학기술학보(영문판)
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
2014年
5期
918-928
,共11页
吕勇强%周强%蔡懿慈%屈钢
呂勇彊%週彊%蔡懿慈%屈鋼
려용강%주강%채의자%굴강
hardware security%trusted integrated circuit%hardware Tro jan%IC authentication%IP protection
Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software security, hardware security has some special features and challenges. In order to guarantee hardware security, academia has proposed the concept of trusted integrated circuits, which aims at a secure circulation of IC design, manufacture and chip using. This paper reviews the main problems of trusted integrated circuits, and concludes four key domains of the trusted IC, namely the trusted IC design, trusted manufacture, trusted IP protection, and trusted chip authentication. The main challenges in those domains are also analyzed based on the current known techniques. Finally, the main limitations of the current techniques and possible future trends are discussed.