仿制品
供应链
多样性(控制论)
特洛伊木马
计算机安全
硬件安全模块
计算机科学
软件
风险分析(工程)
业务
密码学
营销
政治学
人工智能
程序设计语言
法学
作者
Negin Moghadasi,Mai N. Luu,Rahman O. Adekunle,Thomas L. Polmateer,Mark C. Manasco,John M. Emmert,James H. Lambert
标识
DOI:10.1109/tem.2022.3197240
摘要
Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include counterfeit parts, cyber-attacks, Trojan attacks, reliance on offshore-manufactured and controlled hardware, software, and rapid increase of network technologies. Addressing these threats is vital to maintain and enhance system trust and security. This article develops a framework to address initiatives and success criteria which accounts for different perspectives of system stakeholders and identify different potential emergent conditions and scenarios which are most and least impactful to the trust and security of the supply chain. The article demonstrates a research and development priorities preferences method that accounts for evolving perspectives of supply chain stakeholders and describing the example application of embedded hardware devices as a system.
科研通智能强力驱动
Strongly Powered by AbleSci AI