Environmental Engineering Reference
In-Depth Information
NIST SP 800-30. (2002). Risk management guide
for information technology systems . Washington,
DC: National Institute of Standards and Technol-
ogy.
Gorbenko, A. etal. (2006). In M. Butler, C. Jones,
A. Romanovsky, & E. Trubitsyna (Eds.), F(I)
MEA-Technique of Web-services Analysis and
Dependability Ensuring / Rigorous Development
of Complex Fault-Tolerant Systems. LNCS4157
(pp. 153-167). Springer. doi:10.1007/11916246_8
NIST SP 800-53. (2009). Recommended security
controls for federal information systems and or-
ganizations . Washington, DC: National Institute
of Standards and Technology.
Kastner, R., et al. (2008). Threats and Challenges
in Reconfigurable Hardware Security / Interna-
tional Conference on Engineering of Reconfigu-
rable Systems and Algorithms (ERSA'08). - Las
Vegas, NV. July 2008. Pp.334-345.
NUREG/CR-7006. (2010). Review guidelines
for field-programmable gate arrays in nuclear
power plant safety systems . Washington, DC: U.S.
Nuclear Regulatory Commission.
Maggioni, M. (2010). Trojan-free FPGA circuits
using ECC-based functional trust-checking. The-
sis, Politecnico di Milano. 141p.
Ravi, S. etal. (2004). Security in embedded sys-
tems: Design challenges. ACM Transactions on
Embedded Computing Systems , 3 (3), 461-491.
doi:10.1145/1015047.1015049
NIST FIPS PUB 140-2:2001, Security require-
ments for cryptographic modules , National Insti-
tute of Standards and Technology, (2001).
RG 5.71. (2010). Cyber security programs for
nuclear facilities. Washington, DC: U.S. Nuclear
Regulatory Commission.
Tehranipoor, M. (2011). Introduction to Hardware
Security and Trust . Springer.
Sadeghi, A.-R. etal. (2011). Towards hardware-
intrinsic security: Foundations and practice .
Berlin: Springer.
KEY TERMS AND DEFINITIONS
Tehranipoor, M., et al. (2010). A survey of hard-
ware trojan taxonomy and detection. In Proceed-
ings of IEEE Design & Test of Computers . IEEE.
Identification: The process of verifying the
identity of a user, process, or device, usually as
a prerequisite for granting access to resources in
an IT system.
Regulatory Requirement: Requirement
which is established by National Regulatory Au-
thority (authority designated by government for
regulatory purposes for safety assurance).
Risk: The level of impact on agency operations
(including mission, functions, image, or reputa-
tion), agency assets, or individuals resulting from
the operation of an information system, given the
potential impact of a threat and the likelihood of
that threat occurring.
Security: Avoidance of dangerous situation
due to malicious threats.
ADDITIONAL READING
Badrignans, B. etal. (2011). Security Trends for
FPGAS: From Secured to Secure Reconfigurable
Systems . Springer. doi:10.1007/978-94-007-
1338-3
Chakraborty, R., et al. (2009). Hardware Trojan:
Threats and Emerging Solutions / Proceedings of
High Level Design Validation and Test Workshop
(HLDVT 2009). San Francisco, CA. November
4-6, 2009. Pp.166-171.
Search WWH ::




Custom Search