Life-cycle models and security threats to the microchip during its development and exploitation

Download article in PDF format

Authors: Belyakov D. S., Kalinin E. O., Konev A. A., Shelupanov A. A., Mitsel -. -.

Annotation: The growth of Internet of Things devices has shown the need to advance the information security and more specifically the development and operation of microchips, as modern information systems are built around the latter. This article presents the lifecycle of secure chips used as the Root of Trust of information systems. The main stages of the life cycle of protected chips are described, namely life cycle models during development and operation by the end user.

Keywords: security, secure element, lifecycle, protected microcontrollers

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates