The modern technology supply chain is highly complex. Throughout the various stages of design, manufacture, assembly, transport, and operation, a compute device is subject to tampering (malicious or otherwise). This exposes end users and consumers of compute devices to a variety of risks at varying levels of impact. Two potential technology solutions, which aim to provide transparency and insight into the systems in use, are proposed. The success and adoption of these choices, or any other solutions developed, is highly dependent on the participation of ecosystem partners such as foundries, original device manufacturers (ODMs), and original equipment manufacturers (OEMs).
CITATION STYLE
Mattioli, M., Garrison, T., & Patel, B. V. (2021). The Next Security Frontier: Taking the Mystery out of the Supply Chain. IEEE Micro, 41(3), 103–107. https://doi.org/10.1109/MM.2021.3072174
Mendeley helps you to discover research relevant for your work.