[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Alioto, 2022 - Google Patents

Aggressive design reuse for ubiquitous zero-trust edge security—From physical design to machine-learning-based hardware patching

Alioto, 2022

View PDF
Document ID
4489135491698409974
Author
Alioto M
Publication year
Publication venue
IEEE Open Journal of the Solid-State Circuits Society

External Links

Snippet

This work presents an overview of challenges and solid pathways toward ubiquitous and sustainable hardware security in next-generation silicon chips at the edge of distributed and connected systems (eg, IoT and AIoT). As the first challenge, the increasingly connected …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code

Similar Documents

Publication Publication Date Title
Alioto Trends in hardware security: From basics to ASICs
Helfmeier et al. Cloning physically unclonable functions
Nedospasov et al. Invasive PUF analysis
Li et al. Ultra-compact and robust physically unclonable function based on voltage-compensated proportional-to-absolute-temperature voltage generators
Breier et al. How practical are fault injection attacks, really?
Li et al. A self-regulated and reconfigurable CMOS physically unclonable function featuring zero-overhead stabilization
Wan et al. An invasive-attack-resistant PUF based on switched-capacitor circuit
Guo et al. When capacitors attack: Formal method driven design and detection of charge-domain trojans
Knechtel Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges
Akter et al. A survey on hardware security: Current trends and challenges
Tajik et al. Emission analysis of hardware implementations
Clark et al. Physically unclonable functions using foundry SRAM cells
Yehoshuva et al. A survey of security attacks on silicon based weak PUF architectures
KR102122457B1 (en) Security device having physical unclonable function
Knechtel Hardware security for and beyond CMOS technology
Kumar et al. Secure split test techniques to prevent IC piracy for IoT devices
Zhang et al. A SC PUF standard cell used for key generation and anti-invasive-attack protection
Alioto Aggressive design reuse for ubiquitous zero-trust edge security—From physical design to machine-learning-based hardware patching
Kareem et al. Physical unclonable functions based hardware obfuscation techniques: a state of the art
Yamashita et al. Redshift: Manipulating signal propagation delay via continuous-wave lasers
Tajik On the physical security of physically unclonable functions
Bai et al. PUF‐based encryption method for IC cards on‐chip memories
Rangarajan et al. Next Era in Hardware Security
Nagata et al. Analog Techniques for Digital Security: My gratitudes to visionary discussions
Sudhanya et al. Study of different silicon physical unclonable functions