Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

Hardware designs for security in ultra-low-power IoT systems: An overview and survey

K Yang, D Blaauw, D Sylvester - IEEE Micro, 2017 - ieeexplore.ieee.org
The development of ultra-low-power (ULP) electronic devices has opened up opportunities
for disruptive systems like the Internet of Things (IoT). The main concern is the security and …

Physical attack protection techniques for IC chip level hardware security

M Nagata, T Miki, N Miura - IEEE transactions on very large …, 2021 - ieeexplore.ieee.org
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …

Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices

D Vinko, K Miličević, I Lukić, M Köhler - Sensors, 2023 - mdpi.com
Blockchain-based applications necessitate the authentication of connected devices if they
are employed as blockchain oracles. Alongside identity authentication, it is crucial to ensure …

Em attack is non-invasive?-design methodology and validity verification of em attack sensor

N Homma, Y Hayashi, N Miura, D Fujimoto… - … and Embedded Systems …, 2014 - Springer
This paper presents a standard-cell-based semi-automatic design methodology of a new
conceptual countermeasure against electromagnetic (EM) analysis and fault-injection …

S2ADC: A 12-bit, 1.25-MS/s secure SAR ADC with power side-channel attack resistance

T Jeong, AP Chandrakasan… - IEEE Journal of Solid …, 2020 - ieeexplore.ieee.org
When an ADC is converting a confidential analog signal into digital codes, it may expose a
critical hardware security loophole. By exploiting the strong correlation between the ADC …

[PDF][PDF] EM Side Channels in Hardware Security: Attacks and Defenses.

J He, X Guo, MM Tehranipoor, A Vassilev… - IEEE Des …, 2022 - ieeexplore.ieee.org
Side channel analysis (SCA) imposes a severe security threat to circuit implementations,
especially to cryptographic hardware. Among all side channel parameters, electromagnetic …

Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch

A Cannon, T Farheen, S Roy, S Tajik… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
On-chip assets, such as cryptographic keys, intermediate cipher computations, obfuscation
keys, and hardware security primitive outputs, are usually stored in volatile memories, eg …

A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor

K Matsuda, T Fujii, N Shoji, T Sugawara… - IEEE Journal of Solid …, 2018 - ieeexplore.ieee.org
Laser fault injection (LFI) attack on cryptographic processors is a serious threat to
information security. This paper proposes a sense-and-react countermeasure against LFI. A …

Design, analysis and application of embedded resistive RAM based strong arbiter PUF

R Govindaraj, S Ghosh… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Resistive Random Access Memory (RRAM) based Physical Unclonable Function (PUF)
designs exploit either the probabilistic switching or the resistance variability during forming …