Hardware Security Primitives

Автор: literator от 17-12-2022, 09:02, Коментариев: 0

Категория: КНИГИ » АППАРАТУРА

Hardware Security PrimitivesНазвание: Hardware Security Primitives
Автор: Mark Tehranipoor, Nitin Pundir, Nidish Vashistha
Издательство: Springer
Год: 2023
Страниц: 356
Язык: английский
Формат: pdf (true), epub
Размер: 35.6 MB

This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware.

In this modern world of highly connected electronic devices and online cloud data storage, a user can access any sort of information anytime and anywhere with the help of smart devices. Besides storing users’ personal information, these devices also store proprietary data such as encryption keys, soft intellectual property, and confidential information to perform artificial intelligence specialized tasks such as an autopilot for self-driving cars. The presence of confidential and intellectual information on hardware devices makes them a lucrative target for hackers’ attacks. An adversary can compromise the security of these hardware devices, hijack information to achieve financial gains, and steal intellectual property to perform reverse engineering for manufacturing counterfeit cloned devices. Besides these cloned counterfeits, recycled and refurbished devices can be sold as new ones. These recycled devices cause a revenue loss to manufacturers and pose safety issues due to their reduced life span and reliability. Hence, these devices need to be secured from these attacks. One of the possible solutions to ensure hardware security is to physically embed secure circuits for device authentication, random passkey generation, and anti-counterfeiting detection. These circuits have a unique signature as analogous to human retinal/finger imprints and DNA. These signatures are random, hard to predict, and nearly impossible to clone. Hence, it prevents unauthorized access to data and ensures reliable hardware platforms for secure communications, device authentication, and defense against many software and hardware risks and attacks. Physically unclonable functions (PUFs) and True Random Number Generators (TRNGs) are widely used as hardware security primitives to secure hardware devices and counterfeit detection. Therefore, it is necessary to understand their types, applications, and functions for securing hardware devices.

This book will be a comprehensive reference for circuits and systems designers, graduate students, academics, and industrial researchers interested in hardware security and trust. It will include contributions from experts and researchers in the field of secure hardware design and assurance. In addition, this book will cover various security primitives, design considerations for a secure SoC design, and their applications in counterfeit hardware detection.

This volume will provide the most comprehensive coverage of various hardware security primitives, their roles in hardware assurance and supply chain from the integrated circuit to the package level. Chapters 1–7 cover different types of physical unclonable functions (PUFs), which are fundamental components to hardware security. Chapter 8 discusses true random number generators (TRNSs) developed by exploiting the entropy in hardware manufacturing. Chapter 9 discusses hardware security primitives developed using emerging technologies other than CMOS, such as carbon nanotubes. Chapters 10 and 11 present various techniques for hardware camouflaging and watermarking, respectively. Chapter 12 covers various lightweight cryptographic algorithms that can be alternatives to PUFs on resource-constraint devices. Chapter 13 discusses growing virtual proof of reality to provide security based on blockchain and smart contracts. Chapter 14 covers analog security, usually neglected during hardware security discussions. Chapters 15, 16, and 17 cover various IC and package level methods for tempering, counterfeit, and recycled detection. Finally, Chaps. 18 and 19 cover various side-channel and fault-injection resistant primitives for security in cryptographic hardware.

Contents:
1. Intrinsic Racetrack PUF
2. Intrinsic-Transient PUF
3. Direct Intrinsic Characterization PUF
4. Volatile Memory-Based PUF
5. Extrinsic Direct Characterization PUF
6. Hybrid Extrinsic Radio Frequency PUF
7. Optical PUF
8. True Random Number Generators
9. Hardware Security Primitives Based on Emerging Technologies
10. Hardware Camouflaging in Integrated Circuits
11. Embedded Watermarks
12. Lightweight Cryptography
13. Virtual Proof of Reality
14. Analog Security
15. Tamper Detection
16. Counterfeit and Recycled IC Detection
17. Package-Level Counterfeit Detection and Avoidance
18. Side-Channel Protection in Cryptographic Hardware
19. Fault Injection Resistant Cryptographic Hardware

Скачать Hardware Security Primitives








Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.