Skip to main content

Information Security in Integrated Circuits

  • Reference work entry
  • First Online:
Handbook of Integrated Circuit Industry
  • 1826 Accesses

Abstract

Information security is the foundation of information systems and the forever theme of the information society. The main issues of information security including non-invasive attacks, invasive attacks, and semi-invasive attacks have become the hot topic of concerns and focus. As the basic components of electronic information systems, IC plays a critical role in the era of the IoT (Internet-of-Things) and is indispensable for all operations and applications in information security system. The attack and defense technology based on ICs becomes a very important research topic in the field of information security and has been also widely used in many industries practically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 849.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 849.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Areno, 4 integrated circuit security threats and how to protect against them. Physical Security. https://www.darkreading.com/physical-security/4-integrated-circuit-security-threats-and-how-to-protect-against-them/a/d-id/1341486. Accessed 23 May 2023

  2. ADI, Cryptography: Planning for Threats and Countermeasures. https://www.analog.com/en/technical-articles/cryptography-planning-for-threats-and-countermeasures.html#:~:text=A%20security%20IC%20can%20be%20attacked%20by%20one,array%20tampering%2C%20such%20as%20a%20cold%20boot%20attack. Accessed 23 May 2023

  3. D. Neustadter, Secure DDR DRAM Against Rowhammer, RAMBleed, and Cold-Boot Attacks. https://www.design-reuse.com/industryexpertblogs/53687/secure-ddr-dram-against-ro-hammer-rambleed-and-cold-boot-attacks.html. Accessed 23 May 2023

  4. L. Constantin, The second Meltdown: New Intel CPU attacks leak secrets. https://www.csoonline.com/article/3395458/the-second-meltdown-new-intel-cpu-attacks-leak-secrets.html. Accessed 23 May 2023

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chaohui Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 Publishing House of Electronics Industry

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Wang, C., Wang, Q., Peng, Q. (2024). Information Security in Integrated Circuits. In: Wang, Y., Chi, MH., Lou, J.JC., Chen, CZ. (eds) Handbook of Integrated Circuit Industry. Springer, Singapore. https://doi.org/10.1007/978-981-99-2836-1_6

Download citation

Publish with us

Policies and ethics