当前位置: X-MOL 学术IEEE Micro › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
The Next Security Frontier: Taking the Mystery Out of the Supply Chain
IEEE Micro ( IF 3.6 ) Pub Date : 2021-05-26 , DOI: 10.1109/mm.2021.3072174
Michael Mattioli 1 , Tom Garrison 2 , Baiju V. Patel 2
Affiliation  

The modern technology supply chain is highly complex. Throughout the various stages of design, manufacture, assembly, transport, and operation, a compute device is subject to tampering (malicious or otherwise). This exposes end users and consumers of compute devices to a variety of risks at varying levels of impact. Two potential technology solutions, which aim to provide transparency and insight into the systems in use, are proposed. The success and adoption of these choices, or any other solutions developed, is highly dependent on the participation of ecosystem partners such as foundries, original device manufacturers (ODMs), and original equipment manufacturers (OEMs).

中文翻译:

下一个安全前沿:揭开供应链的神秘面纱

现代技术供应链高度复杂。在设计、制造、组装、运输和操作的各个阶段,计算设备都会受到篡改(恶意或其他方式)。这使计算设备的最终用户和消费者面临不同程度影响的各种风险。提出了两种潜在的技术解决方案,旨在提供对所使用系统的透明度和洞察力。这些选择或开发的任何其他解决方案的成功和采用在很大程度上取决于生态系统合作伙伴的参与,例如代工厂、原始设备制造商 (ODM) 和原始设备制造商 (OEM)。
更新日期:2021-05-28
down
wechat
bug