The Next Security Frontier: Taking the Mystery out of the Supply Chain

0Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The modern technology supply chain is highly complex. Throughout the various stages of design, manufacture, assembly, transport, and operation, a compute device is subject to tampering (malicious or otherwise). This exposes end users and consumers of compute devices to a variety of risks at varying levels of impact. Two potential technology solutions, which aim to provide transparency and insight into the systems in use, are proposed. The success and adoption of these choices, or any other solutions developed, is highly dependent on the participation of ecosystem partners such as foundries, original device manufacturers (ODMs), and original equipment manufacturers (OEMs).

Cite

CITATION STYLE

APA

Mattioli, M., Garrison, T., & Patel, B. V. (2021). The Next Security Frontier: Taking the Mystery out of the Supply Chain. IEEE Micro, 41(3), 103–107. https://doi.org/10.1109/MM.2021.3072174

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free