Please use this identifier to cite or link to this item:
https://doi.org/10.1109/CICC.2019.8780123
DC Field | Value | |
---|---|---|
dc.title | Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems | |
dc.contributor.author | ALIOTO,MASSIMO BRUNO | |
dc.contributor.author | SACHIN TANEJA | |
dc.date.accessioned | 2021-05-14T03:34:26Z | |
dc.date.available | 2021-05-14T03:34:26Z | |
dc.date.issued | 2019-04-14 | |
dc.identifier.citation | ALIOTO,MASSIMO BRUNO, SACHIN TANEJA (2019-04-14). Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems. Proc. of IEEE CICC 2019. ScholarBank@NUS Repository. https://doi.org/10.1109/CICC.2019.8780123 | |
dc.identifier.isbn | 9781538693957 | |
dc.identifier.issn | 08865930 | |
dc.identifier.uri | https://scholarbank.nus.edu.sg/handle/10635/191222 | |
dc.description.abstract | "Security down to hardware (HW) has become a fundamental requirement in highly-connected and ubiquitously deployed systems, as a result of the recent discovery of a wide range of vulnerabilities in commercial devices, as well as the affordability of several attacks that were traditionally considered unlikely. HW security is now a fundamental requirement in view of the massive attack surface that they expose, and the substantial power penalty entailed by solutions at higher levels of abstraction. In large-scale networks of connected devices, attacks need to be counteracted at low cost down to individual nodes, which need to be identified or authenticated securely, and protect confidentiality and integrity of the data that is sensed, stored, processed and wirelessly exchanged. In many security-sensitive applications, physical attacks against individual chips need to be counteracted to truly enable an end-to-end chain of trust from nodes to cloud and actuation (i.e., always-on security). These requirements have motivated the on-going global research and development effort to assure hardware security at low cost and power penalty down to low-end devices (i.e., ubiquitous security). This paper provides a fresh overview of the fundamentals, the design requirements and the state of the art in primitives for HW security. Challenges and future directions are discussed using recent silicon demonstrations as case studies." | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.rights | CC0 1.0 Universal | |
dc.rights.uri | http://creativecommons.org/publicdomain/zero/1.0/ | |
dc.subject | attacks | |
dc.subject | cryptography | |
dc.subject | Hardware security | |
dc.subject | low power | |
dc.subject | PUFs | |
dc.subject | Random Number Generators | |
dc.type | Conference Paper | |
dc.contributor.department | ELECTRICAL AND COMPUTER ENGINEERING | |
dc.description.doi | 10.1109/CICC.2019.8780123 | |
dc.description.sourcetitle | Proc. of IEEE CICC 2019 | |
dc.published.state | Published | |
dc.grant.fundingagency | National Research Foundation Singapore | |
Appears in Collections: | Elements Staff Publications |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems.pdf | 609.82 kB | Adobe PDF | OPEN | Post-print | View/Download |
This item is licensed under a Creative Commons License