BSI PD ISO/IEC TR 5891:2024
$167.15
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment
Published By | Publication Date | Number of Pages |
BSI | 2024 | 42 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Abbreviated terms 5 Relationship to existing standards 5.1 Standards of security assessment |
11 | 5.2 Relationship to ISO/IEC 15408-3 5.3 Relationship to ISO/IEC TS 30104 6 Background 6.1 Complexity and security 6.2 Challenges in defining hardware security assessment techniques |
12 | 7 Hardware monitoring technologies 7.1 Overview 7.2 Research in academic areas |
13 | 7.3 Industrial cases |
14 | 7.4 Purpose 7.4.1 Security |
15 | 7.4.2 Debugging |
16 | 7.4.3 Tuning performance 7.4.4 Fault tolerance and QoS |
17 | 7.4.5 Physical specification measurement |
18 | 7.4.6 Application-specific monitoring 7.5 Carrier type 7.5.1 Middleware |
19 | 7.5.2 Software |
21 | 7.5.3 Hardware-assisted monitors |
24 | 7.5.4 Software vs. hardware-assisted solutions 7.6 Target entity 7.6.1 IP cores |
25 | 7.6.2 Processing units 7.6.3 Memory |
26 | 7.6.4 Peripheral devices 7.7 Objective patterns 7.7.1 Information content 7.7.2 Physical specification 7.7.3 Behaviours |
27 | 7.8 Deployment method 7.8.1 General 7.8.2 Intrusiveness 7.8.3 Offline or online 7.8.4 Synchronous or asynchronous 7.8.5 Single or multiple monitors 7.8.6 Scalability |
28 | 7.8.7 Resilience and redundancy 7.8.8 Compatibility 7.8.9 Impact on performance 7.8.10 Lawful and ethical data handling regulations and requirements 8 Utilizing monitoring technologies for hardware security assessment 8.1 Existing state-of-the-art security assessment approaches |
29 | 8.2 How hardware monitoring can help |
30 | 8.3 Challenges |
32 | 9 Certification for monitoring hardware |
35 | Bibliography |