Journal ArticleDOI
A Primer on Hardware Security: Models, Methods, and Metrics
Masoud Rostami,Farinaz Koushanfar,Ramesh Karri +2 more
- Vol. 102, Iss: 8, pp 1283-1295
TLDR
This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.Abstract:
The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.read more
Citations
More filters
Proceedings ArticleDOI
Security and privacy challenges in industrial internet of things
TL;DR: This paper gives an introduction to industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems.
Proceedings ArticleDOI
Provably-Secure Logic Locking: From Theory To Practice
Muhammad Yasin,Abhrajit Sengupta,Mohammed Nabeel,Mohammed Ashraf,Jeyavijayan Rajendran,Ozgur Sinanoglu +5 more
TL;DR: This paper proposes stripped-functionality logic locking (SFLL), which strips some of the functionality of the design and hides it in the form of a secret key(s), thereby rendering on-chip implementation functionally different from the original one.
Journal ArticleDOI
On Improving the Security of Logic Locking
TL;DR: A new security metric and a method to deliver strong logic locking are introduced and it is demonstrated that an attacker can decipher the locked netlist, in a time linear to the number of keys, by sensitizing the key-bits to the output.
Book ChapterDOI
Mitigating SAT Attack on Logic Locking
Yang Xie,Ankur Srivastava +1 more
TL;DR: It is shown that the number of SAT attack iterations to reveal the correct key in a circuit comprising an Anti-SAT block is an exponential function of the key-size thereby making the SAT attack computationally infeasible.
Journal ArticleDOI
Anatomy of Threats to the Internet of Things
TL;DR: A composite guideline for the development of an IoT security framework based on industry best practices is proposed and also highlights lessons learned, pitfalls and some open research challenges.
References
More filters
Book ChapterDOI
Differential Power Analysis
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI
A Survey of Hardware Trojan Taxonomy and Detection
TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Journal ArticleDOI
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
TL;DR: It is demonstrated that a 512-byte SRAM fingerprint contains sufficient entropy to generate 128-bit true random numbers and that the generated numbers pass the NIST tests for runs, approximate entropy, and block frequency.
Posted Content
The Sorcerer's Apprentice Guide to Fault Attacks.
TL;DR: The effect of faults on electronic systems has been studied since the 1970s when it was noticed that radioactive particles caused errors in chips as discussed by the authors, and this led to further research on the effect of charged particles on silicon, motivated by the aerospace industry who was becoming concerned about the effects of faults in airborn electronic systems.
Book
Understanding Cryptography: A Textbook For Students And Practitioners
Christof Paar,Jan Pelzl +1 more
TL;DR: The authors move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.