Next Article in Journal
Performance Analysis of Heterodyne-Detected OCDMA Systems Using PolSK Modulation over a Free-Space Optical Turbulence Channel
Next Article in Special Issue
Runtime-Monitoring for Industrial Control Systems
Previous Article in Journal
Reactive Planning of Autonomous Vehicles for Traffic Scenarios
Previous Article in Special Issue
Beyond the Interconnections: Split Manufacturing in RF Designs
Open AccessFeature PaperReview

Introduction to Hardware Security

Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32765, USA
Academic Editor: Dhananjay S. Phatak
Electronics 2015, 4(4), 763-784; https://doi.org/10.3390/electronics4040763
Received: 3 August 2015 / Revised: 19 September 2015 / Accepted: 5 October 2015 / Published: 13 October 2015
Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area. View Full-Text
Keywords: hardware security; hardware trojan; proof-carrying hardware; trusted hardware platform hardware security; hardware trojan; proof-carrying hardware; trusted hardware platform
MDPI and ACS Style

Jin, Y. Introduction to Hardware Security. Electronics 2015, 4, 763-784.

Show more citation formats Show less citations formats

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Back to TopTop