Life-cycle models and security threats to the microchip during its development and exploitation
Download article in PDF format
Authors: Belyakov D. S., Kalinin E. O., Konev A. A., Shelupanov A. A., Mitsel -. -.
Annotation: The growth of Internet of Things devices has shown the need to advance the information security and more specifically the development and operation of microchips, as modern information systems are built around the latter. This article presents the lifecycle of secure chips used as the Root of Trust of information systems. The main stages of the life cycle of protected chips are described, namely life cycle models during development and operation by the end user.
Keywords: security, secure element, lifecycle, protected microcontrollers