Introduction to Hardware Security
Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32765, USA
Academic Editor: Dhananjay S. Phatak
Electronics 2015, 4(4), 763-784; https://doi.org/10.3390/electronics4040763
Received: 3 August 2015 / Revised: 19 September 2015 / Accepted: 5 October 2015 / Published: 13 October 2015
(This article belongs to the Special Issue Cyber Security for Embedded Systems: Testing and Protecting Electronic Hardware)
AbstractHardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area. View Full-Text
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
Share & Cite This Article
MDPI and ACS Style
Jin, Y. Introduction to Hardware Security. Electronics 2015, 4, 763-784.
Jin Y. Introduction to Hardware Security. Electronics. 2015; 4(4):763-784.Chicago/Turabian Style
Jin, Yier. 2015. "Introduction to Hardware Security." Electronics 4, no. 4: 763-784.
Find Other Styles
For more information on the journal statistics, click here. Multiple requests from the same IP address are counted as one view.