Hardware security for Internet of Things identity assurance
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …
prioritize their security, especially in the context of identity and authentication mechanisms …
Cloning physically unclonable functions
C Helfmeier, C Boit, D Nedospasov… - … on Hardware-Oriented …, 2013 - ieeexplore.ieee.org
As system security demands continue to evolve, Physically Unclonable Functions (PUFs)
are a promising solution for secure storage on Integrated Circuits (ICs). SRAM PUFs are …
are a promising solution for secure storage on Integrated Circuits (ICs). SRAM PUFs are …
The temperature side channel and heating fault attacks
In this paper, we present practical results of data leakages of CMOS devices via the
temperature side channel—a side channel that has been widely cited in literature but not …
temperature side channel—a side channel that has been widely cited in literature but not …
Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller
Injection of transient faults as a way to attack cryptographic implementations has been
largely studied in the last decade. Several attacks that use electromagnetic fault injection …
largely studied in the last decade. Several attacks that use electromagnetic fault injection …
Breaking and entering through the silicon
C Helfmeier, D Nedospasov, C Tarnovsky… - Proceedings of the …, 2013 - dl.acm.org
As the surplus market of failure analysis equipment continues to grow, the cost of performing
invasive IC analysis continues to diminish. Hardware vendors in high-security applications …
invasive IC analysis continues to diminish. Hardware vendors in high-security applications …
Physical characterization of arbiter PUFs
As intended by its name, Physically Unclonable Functions (PUFs) are considered as an
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …
Physical inspection & attacks: New frontier in hardware security
Due to globalization, the semiconductor industry is becoming more susceptible to trust and
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …
Lessons learned: Analysis of PUF-based authentication protocols for IoT
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …
where entities prove their identities to each other and generally establish and derive …
Real-world snapshots vs. theory: Questioning the t-probing security model
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …
prominent countermeasure to protect cryptographic implementations against physical side …
Advancing hardware security using polymorphic and stochastic spin-hall effect devices
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in
recent years. Logic locking/encryption and layout camouflaging are two prominent …
recent years. Logic locking/encryption and layout camouflaging are two prominent …