Helper data algorithms for PUF-based key generation: Overview and analysis
Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is
challenging for low-cost resource-constrained embedded devices, with an attacker having …
challenging for low-cost resource-constrained embedded devices, with an attacker having …
Keystone: An open framework for architecting trusted execution environments
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …
cloud servers and encompass a range of cost, power constraints, and security threat model …
Hardware security for Internet of Things identity assurance
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …
prioritize their security, especially in the context of identity and authentication mechanisms …
[PDF][PDF] Intel SGX explained
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
TrustLite: A security architecture for tiny embedded devices
Embedded systems are increasingly pervasive, interdependent and in many cases critical to
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …
Physical unclonable functions for device authentication and secret key generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
Power-up SRAM state as an identifying fingerprint and source of true random numbers
Intermittently powered applications create a need for low-cost security and privacy in
potentially hostile environments, supported by primitives including identification and random …
potentially hostile environments, supported by primitives including identification and random …
AEGIS: Architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip AEGIS processor which can be used to build
computing systems secure against both physical and software attacks. Our architecture …
computing systems secure against both physical and software attacks. Our architecture …
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services.
Virtualization is the key underlying technology enabling cloud providers to host services for …
Virtualization is the key underlying technology enabling cloud providers to host services for …
[PDF][PDF] Active Hardware Metering for Intellectual Property Protection and Security.
We introduce the first active hardware metering scheme that aims to protect integrated
circuits (IC) intellectual property (IP) against piracy and runtime tampering. The novel …
circuits (IC) intellectual property (IP) against piracy and runtime tampering. The novel …