Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

Cloning physically unclonable functions

C Helfmeier, C Boit, D Nedospasov… - … on Hardware-Oriented …, 2013 - ieeexplore.ieee.org
As system security demands continue to evolve, Physically Unclonable Functions (PUFs)
are a promising solution for secure storage on Integrated Circuits (ICs). SRAM PUFs are …

The temperature side channel and heating fault attacks

M Hutter, JM Schmidt - Smart Card Research and Advanced Applications …, 2014 - Springer
In this paper, we present practical results of data leakages of CMOS devices via the
temperature side channel—a side channel that has been widely cited in literature but not …

Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller

N Moro, A Dehbaoui, K Heydemann… - 2013 Workshop on …, 2013 - ieeexplore.ieee.org
Injection of transient faults as a way to attack cryptographic implementations has been
largely studied in the last decade. Several attacks that use electromagnetic fault injection …

Breaking and entering through the silicon

C Helfmeier, D Nedospasov, C Tarnovsky… - Proceedings of the …, 2013 - dl.acm.org
As the surplus market of failure analysis equipment continues to grow, the cost of performing
invasive IC analysis continues to diminish. Hardware vendors in high-security applications …

Physical characterization of arbiter PUFs

S Tajik, E Dietz, S Frohmann, JP Seifert… - … and Embedded Systems …, 2014 - Springer
As intended by its name, Physically Unclonable Functions (PUFs) are considered as an
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …

Physical inspection & attacks: New frontier in hardware security

MT Rahman, Q Shi, S Tajik, H Shen… - 2018 IEEE 3rd …, 2018 - ieeexplore.ieee.org
Due to globalization, the semiconductor industry is becoming more susceptible to trust and
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …

Lessons learned: Analysis of PUF-based authentication protocols for IoT

K Lounis, M Zulkernine - Digital Threats: Research and Practice, 2023 - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …

Real-world snapshots vs. theory: Questioning the t-probing security model

T Krachenfels, F Ganji, A Moradi… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …

Advancing hardware security using polymorphic and stochastic spin-hall effect devices

S Patnaik, N Rangarajan, J Knechtel… - … , Automation & Test …, 2018 - ieeexplore.ieee.org
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in
recent years. Logic locking/encryption and layout camouflaging are two prominent …