
ISO 5891:2024
ISO 5891:2024 Information security, cybersecurity and privacy protection – Hardware monitoring technology for hardware security assessment
CDN $273.00
Description
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security assessment with some existing state-of-the-art security assessment approaches.
The hardware mentioned in this document refers only to the core processing hardware, such as the central processing unit (CPU), microcontroller unit (MCU), and system on a chip (SoC), in the von Neumann system and does not include single-input or single-output devices such as memory or displays.
The hardware monitoring technology discussed in this document has the following considerations and restrictions:
–    the monitored target is for the post-silicon phase, not for the design-house phase (e.g. an RTL or netlist design);
–    monitoring is only applied to the runtime system.
Edition
1
Published Date
2024-04-03
Status
PUBLISHED
Pages
32
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security assessment with some existing state-of-the-art security assessment approaches.
The hardware mentioned in this document refers only to the core processing hardware, such as the central processing unit (CPU), microcontroller unit (MCU), and system on a chip (SoC), in the von Neumann system and does not include single-input or single-output devices such as memory or displays.
The hardware monitoring technology discussed in this document has the following considerations and restrictions:
-    the monitored target is for the post-silicon phase, not for the design-house phase (e.g. an RTL or netlist design);
-    monitoring is only applied to the runtime system.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27010:2015 Information technology – Security techniques – Information security management for inter-sector and inter-organizational communications
CDN $273.00 Add to cart -

ISO 20009:2022 Information security – Anonymous entity authentication – Part 3: Mechanisms based on blind signatures
CDN $173.00 Add to cart -

ISO 20008:2024 Information security – Anonymous digital signatures – Part 3: Mechanisms using multiple public keys
CDN $233.00 Add to cart -

ISO 27001:2022 Information security, cybersecurity and privacy protection – Information security management systems – Requirements
CDN $285.00 Add to cart







