Environmental Engineering Reference
In-Depth Information
NIST SP 800-30. (2002).
Risk management guide
for information technology systems
. Washington,
DC: National Institute of Standards and Technol-
ogy.
Gorbenko, A. etal. (2006). In M. Butler, C. Jones,
A. Romanovsky, & E. Trubitsyna (Eds.),
F(I)
MEA-Technique of Web-services Analysis and
Dependability Ensuring / Rigorous Development
of Complex Fault-Tolerant Systems. LNCS4157
(pp. 153-167). Springer. doi:10.1007/11916246_8
NIST SP 800-53. (2009).
Recommended security
controls for federal information systems and or-
ganizations
. Washington, DC: National Institute
of Standards and Technology.
Kastner, R., et al. (2008).
Threats and Challenges
in Reconfigurable Hardware Security
/ Interna-
tional Conference on Engineering of Reconfigu-
rable Systems and Algorithms (ERSA'08). - Las
Vegas, NV. July 2008. Pp.334-345.
NUREG/CR-7006. (2010).
Review guidelines
for field-programmable gate arrays in nuclear
power plant safety systems
. Washington, DC: U.S.
Nuclear Regulatory Commission.
Maggioni, M. (2010). Trojan-free FPGA circuits
using ECC-based functional trust-checking. The-
sis, Politecnico di Milano. 141p.
Ravi, S. etal. (2004). Security in embedded sys-
tems: Design challenges.
ACM Transactions on
Embedded Computing Systems
,
3
(3), 461-491.
doi:10.1145/1015047.1015049
NIST FIPS PUB 140-2:2001,
Security require-
ments for cryptographic modules
, National Insti-
tute of Standards and Technology, (2001).
RG 5.71. (2010).
Cyber security programs for
nuclear facilities.
Washington, DC: U.S. Nuclear
Regulatory Commission.
Tehranipoor, M. (2011).
Introduction to Hardware
Security and Trust
. Springer.
Sadeghi, A.-R. etal. (2011).
Towards hardware-
intrinsic security: Foundations and practice
.
Berlin: Springer.
KEY TERMS AND DEFINITIONS
Tehranipoor, M., et al. (2010). A survey of hard-
ware trojan taxonomy and detection. In
Proceed-
ings of IEEE Design & Test of Computers
. IEEE.
Identification:
The process of verifying the
identity of a user, process, or device, usually as
a prerequisite for granting access to resources in
an IT system.
Regulatory Requirement:
Requirement
which is established by National Regulatory Au-
thority (authority designated by government for
regulatory purposes for safety assurance).
Risk:
The level of impact on agency operations
(including mission, functions, image, or reputa-
tion), agency assets, or individuals resulting from
the operation of an information system, given the
potential impact of a threat and the likelihood of
that threat occurring.
Security:
Avoidance of dangerous situation
due to malicious threats.
ADDITIONAL READING
Badrignans, B. etal. (2011).
Security Trends for
FPGAS: From Secured to Secure Reconfigurable
Systems
. Springer. doi:10.1007/978-94-007-
1338-3
Chakraborty, R., et al. (2009).
Hardware Trojan:
Threats and Emerging Solutions
/ Proceedings of
High Level Design Validation and Test Workshop
(HLDVT 2009). San Francisco, CA. November
4-6, 2009. Pp.166-171.
Search WWH ::
Custom Search