Abstract

The modern technology supply chain is highly complex. Throughout the various stages of design, manufacture, assembly, transport, and operation, a compute device is subject to tampering (malicious or otherwise). This exposes end users and consumers of compute devices to a variety of risks at varying levels of impact. Two potential technology solutions, which aim to provide transparency and insight into the systems in use, are proposed. The success and adoption of these choices, or any other solutions developed, is highly dependent on the participation of ecosystem partners such as foundries, original device manufacturers (ODMs), and original equipment manufacturers (OEMs).

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call