Hardware Supply Chain Security 2021
DOI: 10.1007/978-3-030-62707-2_1
|View full text |Cite
|
Sign up to set email alerts
|

CIST: A Threat Modelling Approach for Hardware Supply Chain Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 149 publications
0
4
0
Order By: Relevance
“…Military systems in a contested environment include a wide range of electronic devices used for espionage and undercover activities. In both of the above cases, it is reasonable to assume that the adversary is either a large criminal organization or a statefunded actor, as they are the most likely beneficiaries of attacking such systems [23].…”
Section: Imentioning
confidence: 99%
“…Military systems in a contested environment include a wide range of electronic devices used for espionage and undercover activities. In both of the above cases, it is reasonable to assume that the adversary is either a large criminal organization or a statefunded actor, as they are the most likely beneficiaries of attacking such systems [23].…”
Section: Imentioning
confidence: 99%
“…The consequences of an insecure IC supply chain are not only limited to significant financial losses but also pose a national security threat. Another trend that has further increased the hardware attack surface is the proliferation of the Internet of Things technology and embedded systems (Halak, 2021). A lack of focus on the early detection and mitigation of hardware vulnerabilities can have devastating consequences that are far more costly and time-consuming to remediate than software incidents (Nygård et al , 2022).…”
Section: Introductionmentioning
confidence: 99%
“…used at system-level HRE [select from list inHalak (2021)] Created by author and is related to the use-case in reference …”
mentioning
confidence: 99%
“…Ultrasound is highly susceptible to cyberattacks [36]. In most of the current research, there are various methods for generating noises but most of these studies are based on hardware [37]. Compared with hardware-based encrypting algorithms, software-based algorithms can be updated with software engineers to increase encrypting capability [38]; therefore, we applied a mathematically generated noise function to generate random bits for ultrasound systems.…”
Section: Introductionmentioning
confidence: 99%