Hardware Security
Hardware Security
Introduction
• Hardware security –differs from software, network,
and data security because of the nature of
hardware.
• Hardware design and manufacturing occur before
or during software development,
• Security- Early product life cycle
• Hardware –Executes the software code, controls
cyber physical system
• So it is the last line for defense or damage of system
• Hardware also has a longer lifespan than most
software
• After we deploy hardware we usually cannot
update it
• We can update software by uploading new code
• Even after hardware outlives its usefulness,
we must dispose of it properly or risk attacks
such as theft of the data or software still
resident in the hardware.
• Hardware security is important for the entire
lifespan of a cyber-physical system, from
before design until after retirement.
• Two aspects of security
Hardware provide chain security
Hardware support for software package
security
Hardware –Supply chain security
• Possible attacks on the IC supply chain include
maliciously modifying ICs, copying of ICs to
produce cloned devices, or stealing intellectual
property (IP)