scispace - formally typeset
Journal ArticleDOI

A Primer on Hardware Security: Models, Methods, and Metrics

TLDR
This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.
Abstract
The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.

read more

Citations
More filters
Proceedings ArticleDOI

Security and privacy challenges in industrial internet of things

TL;DR: This paper gives an introduction to industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems.
Proceedings ArticleDOI

Provably-Secure Logic Locking: From Theory To Practice

TL;DR: This paper proposes stripped-functionality logic locking (SFLL), which strips some of the functionality of the design and hides it in the form of a secret key(s), thereby rendering on-chip implementation functionally different from the original one.
Journal ArticleDOI

On Improving the Security of Logic Locking

TL;DR: A new security metric and a method to deliver strong logic locking are introduced and it is demonstrated that an attacker can decipher the locked netlist, in a time linear to the number of keys, by sensitizing the key-bits to the output.
Book ChapterDOI

Mitigating SAT Attack on Logic Locking

TL;DR: It is shown that the number of SAT attack iterations to reveal the correct key in a circuit comprising an Anti-SAT block is an exponential function of the key-size thereby making the SAT attack computationally infeasible.
Journal ArticleDOI

Anatomy of Threats to the Internet of Things

TL;DR: A composite guideline for the development of an IoT security framework based on industry best practices is proposed and also highlights lessons learned, pitfalls and some open research challenges.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI

A Survey of Hardware Trojan Taxonomy and Detection

TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Journal ArticleDOI

Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers

TL;DR: It is demonstrated that a 512-byte SRAM fingerprint contains sufficient entropy to generate 128-bit true random numbers and that the generated numbers pass the NIST tests for runs, approximate entropy, and block frequency.
Posted Content

The Sorcerer's Apprentice Guide to Fault Attacks.

TL;DR: The effect of faults on electronic systems has been studied since the 1970s when it was noticed that radioactive particles caused errors in chips as discussed by the authors, and this led to further research on the effect of charged particles on silicon, motivated by the aerospace industry who was becoming concerned about the effects of faults in airborn electronic systems.
Book

Understanding Cryptography: A Textbook For Students And Practitioners

Christof Paar, +1 more
TL;DR: The authors move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.
Related Papers (5)