Visible to the public Protecting the Supply Chain for Automotives and IoTs

TitleProtecting the Supply Chain for Automotives and IoTs
Publication TypeConference Paper
Year of Publication2018
AuthorsRay, Sandip, Chen, Wen, Cammarota, Rosario
Conference NameProceedings of the 55th Annual Design Automation Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5700-5
Keywordsdesign for debug, design for test, Hardware Trojans, Human Behavior, key provisioning, pubcrawl, Resiliency, Scalability, secure keys, supply chain security
AbstractModern automotive systems and IoT devices are designed through a highly complex, globalized, and potentially untrustworthy supply chain. Each player in this supply chain may (1) introduce sensitive information and data (collectively termed "assets") that must be protected from other players in the supply chain, and (2) have controlled access to assets introduced by other players. Furthermore, some players in the supply chain may be malicious. It is imperative to protect the device and any sensitive assets in it from being compromised or unknowingly disclosed by such entities. A key -- and sometimes overlooked -- component of security architecture of modern electronic systems entails managing security in the face of supply chain challenges. In this paper we discuss some security challenges in automotive and IoT systems arising from supply chain complexity, and the state of the practice in this area.
URLhttp://doi.acm.org/10.1145/3195970.3199851
DOI10.1145/3195970.3199851
Citation Keyray_protecting_2018