Verified Value Chains, Innovation and Competition

The paper addresses three issues: The first one is vulnerabilities in IT systems, the second is significant market power in hardware production, and the third is sovereignty of nations and manufacturers regarding their IT input. The paper reviews some recent developments towards open verifiable comp...

Full description

Saved in:
Bibliographic Details
Published in:2023 IEEE International Conference on Cyber Security and Resilience (CSR) pp. 470 - 476
Main Authors: Weber, Arnd, Guilley, Sylvain, Rathfelder, Rene, Stottinger, Marc, Luth, Christoph, Malenko, Maja, Grawunder, Torsten, Reith, Steffen, Puccetti, Armand, Seifert, Jean-Pierre, Herfurth, Norbert, Sankowski, Hagen, Heiser, Gernot
Format: Conference Proceeding
Language:English
Published: IEEE 31-07-2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The paper addresses three issues: The first one is vulnerabilities in IT systems, the second is significant market power in hardware production, and the third is sovereignty of nations and manufacturers regarding their IT input. The paper reviews some recent developments towards open verifiable components, such as for open processors, hardware security modules, operating systems, and semiconductor production systems. These developments provide opportunities for new products. Even manufacturers in non-leading countries might be empowered to produce hard-to-attack products. Currently pending IT security regulation will not achieve such a level of security by itself. Open and better verified, ultimately provably secure components will foster more sovereignty. Technical limits and costs of the approaches are discussed. It is concluded that fighting vulnerabilities and providing space for new products and jobs justify further privately and publicly supported research.
DOI:10.1109/CSR57506.2023.10224911