Visible to the public Protecting the Supply Chain for Automotives and IoTsConflict Detection Enabled

TitleProtecting the Supply Chain for Automotives and IoTs
Publication TypeConference Paper
Year of Publication2018
AuthorsRay, Sandip, Chen, Wen, Cammarota, Rosario
Conference NameProceedings of the 55th Annual Design Automation Conference
PublisherAssociation for Computing Machinery
Conference LocationSan Francisco, California
ISBN Number9781450357005
Keywordsdesign for debug, design for test, Hardware Trojans, key provisioning, secure keys
AbstractModern automotive systems and IoT devices are designed through a highly complex, globalized, and potentially untrustworthy supply chain. Each player in this supply chain may (1) introduce sensitive information and data (collectively termed "assets") that must be protected from other players in the supply chain, and (2) have controlled access to assets introduced by other players. Furthermore, some players in the supply chain may be malicious. It is imperative to protect the device and any sensitive assets in it from being compromised or unknowingly disclosed by such entities. A key –- and sometimes overlooked –- component of security architecture of modern electronic systems entails managing security in the face of supply chain challenges. In this paper we discuss some security challenges in automotive and IoT systems arising from supply chain complexity, and the state of the practice in this area.
URLhttps://doi.org/10.1145/3195970.3199851
DOI10.1145/3195970.3199851
Citation Key10.1145/3195970.3199851