Next Article in Journal
Performance Analysis of Heterodyne-Detected OCDMA Systems Using PolSK Modulation over a Free-Space Optical Turbulence Channel
Next Article in Special Issue
Runtime-Monitoring for Industrial Control Systems
Previous Article in Journal
Reactive Planning of Autonomous Vehicles for Traffic Scenarios
Previous Article in Special Issue
Beyond the Interconnections: Split Manufacturing in RF Designs
Article Menu

Export Article

Open AccessFeature PaperReview
Electronics 2015, 4(4), 763-784; doi:10.3390/electronics4040763

Introduction to Hardware Security

Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32765, USA
Academic Editor: Dhananjay S. Phatak
Received: 3 August 2015 / Revised: 19 September 2015 / Accepted: 5 October 2015 / Published: 13 October 2015
View Full-Text   |   Download PDF [142 KB, uploaded 13 October 2015]

Abstract

Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area. View Full-Text
Keywords: hardware security; hardware trojan; proof-carrying hardware; trusted hardware platform hardware security; hardware trojan; proof-carrying hardware; trusted hardware platform
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Jin, Y. Introduction to Hardware Security. Electronics 2015, 4, 763-784.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Electronics EISSN 2079-9292 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top