TY - GEN
T1 - Hardware Supply Chain Security and EM Tricks
AU - Nagata, Makoto
AU - Homma, Naofumi
AU - Hayashi, Yuichi
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - This paper addresses the urgent need for developing technologies to ensure the trustworthiness, verifiability, and resilience of supply chains in the face of evolving threats. Specifically, the paper focuses on the importance of semiconductor supply chain security and the authentication of integrated circuit (IC) chips. The circulation of dubious IC chips is discussed, including the potential for counterfeit products to be disseminated among low-price markets and the presence of hardware Trojans (HTs). The paper proposes a three-pronged approach to ensure the authenticity of IC chips, including the reinforcement of semiconductor manufacturing capability, the deterrence of dubious semiconductor product distribution, and the development of assurance technologies for authentication of semiconductor products. The use of electromagnetic (EM) tricks to suppress counterfeits and HTs is also discussed, including the use of on-chip power current measurements and off-chip active EM wave sensing for electrical authentication of electronic systems. The paper concludes by emphasizing the importance of active scientific and technical contributions toward the development of trustworthy supply chains.
AB - This paper addresses the urgent need for developing technologies to ensure the trustworthiness, verifiability, and resilience of supply chains in the face of evolving threats. Specifically, the paper focuses on the importance of semiconductor supply chain security and the authentication of integrated circuit (IC) chips. The circulation of dubious IC chips is discussed, including the potential for counterfeit products to be disseminated among low-price markets and the presence of hardware Trojans (HTs). The paper proposes a three-pronged approach to ensure the authenticity of IC chips, including the reinforcement of semiconductor manufacturing capability, the deterrence of dubious semiconductor product distribution, and the development of assurance technologies for authentication of semiconductor products. The use of electromagnetic (EM) tricks to suppress counterfeits and HTs is also discussed, including the use of on-chip power current measurements and off-chip active EM wave sensing for electrical authentication of electronic systems. The paper concludes by emphasizing the importance of active scientific and technical contributions toward the development of trustworthy supply chains.
KW - Cryptography
KW - Electromagnetic compatibility
KW - Hardware security
KW - Hardware Trojans
KW - Implementation attacks
KW - Integrated circuits
KW - Semiconductors
KW - Side channel information leakage
UR - http://www.scopus.com/inward/record.url?scp=85174564670&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85174564670&partnerID=8YFLogxK
U2 - 10.1109/EMCEurope57790.2023.10274179
DO - 10.1109/EMCEurope57790.2023.10274179
M3 - Conference contribution
AN - SCOPUS:85174564670
T3 - IEEE International Symposium on Electromagnetic Compatibility
BT - 2023 International Symposium on Electromagnetic Compatibility - EMC Europe, EMC Europe 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2023 International Symposium on Electromagnetic Compatibility - EMC Europe, EMC Europe 2023
Y2 - 4 September 2023 through 8 September 2023
ER -