Helper data algorithms for PUF-based key generation: Overview and analysis

J Delvaux, D Gu, D Schellekens… - IEEE Transactions on …, 2014‏ - ieeexplore.ieee.org
Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is
challenging for low-cost resource-constrained embedded devices, with an attacker having …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020‏ - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024‏ - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

[PDF][PDF] Intel SGX explained

V Costan - IACR Cryptol, EPrint Arch, 2016‏ - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …

TrustLite: A security architecture for tiny embedded devices

P Koeberl, S Schulz, AR Sadeghi… - Proceedings of the Ninth …, 2014‏ - dl.acm.org
Embedded systems are increasingly pervasive, interdependent and in many cases critical to
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …

Physical unclonable functions for device authentication and secret key generation

GE Suh, S Devadas - Proceedings of the 44th annual design automation …, 2007‏ - dl.acm.org
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …

Power-up SRAM state as an identifying fingerprint and source of true random numbers

DE Holcomb, WP Burleson, K Fu - IEEE Transactions on …, 2008‏ - ieeexplore.ieee.org
Intermittently powered applications create a need for low-cost security and privacy in
potentially hostile environments, supported by primitives including identification and random …

AEGIS: Architecture for tamper-evident and tamper-resistant processing

GE Suh, D Clarke, B Gassend, M Van Dijk… - ACM International …, 2003‏ - dl.acm.org
We describe the architecture for a single-chip AEGIS processor which can be used to build
computing systems secure against both physical and software attacks. Our architecture …

Eliminating the hypervisor attack surface for a more secure cloud

J Szefer, E Keller, RB Lee, J Rexford - … of the 18th ACM conference on …, 2011‏ - dl.acm.org
Cloud computing is quickly becoming the platform of choice for many web services.
Virtualization is the key underlying technology enabling cloud providers to host services for …

[PDF][PDF] Active Hardware Metering for Intellectual Property Protection and Security.

Y Alkabani, F Koushanfar - USENIX security symposium, 2007‏ - usenix.org
We introduce the first active hardware metering scheme that aims to protect integrated
circuits (IC) intellectual property (IP) against piracy and runtime tampering. The novel …