The 21st century is the information era. IC (Integrated Circuit) is the basis of the modern information industry. The
security vulnerability or back door of IC is directly related to the entire information system security. From the
perspective of information security, security vulnerability of chip is led out through the practical examples and then the
importance of security vulnerability of chip is emphasized. By comparing the security vulnerability of chip with the
software virus, the characteristics of the chip vulnerabilities are summed up. Moreover, this paper describes the security
vulnerability models of different control logic chips, combinational and sequential logic chips models. Finally it puts
forward two kinds of detecting methods of security vulnerability of chip against the two models.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.